Mobile

News & Commentary
Free New Scanner Aims to Protect Home Networks
Dark Reading Staff, Quick Hits
Free software pinpoints vulnerabilities and offers suggestions for remediation.
By Dark Reading Staff , 7/19/2018
Comment0 comments  |  Read  |  Post a Comment
Messenger Apps Top Risk Hit Parade
Dark Reading Staff, Quick Hits
Whether running on iOS or Android, Facebook's and WhatsApp's messenger apps present a 'winning' combination.
By Dark Reading Staff , 7/18/2018
Comment0 comments  |  Read  |  Post a Comment
Apple Releases Wave of Security Updates
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Apple updates software for nearly every hardware platform, though one new feature almost steals the security show.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/11/2018
Comment0 comments  |  Read  |  Post a Comment
For Data Thieves, the World Cup Runneth Over
Travis Jarae, Founder & CEO of One World IdentityCommentary
Large sporting events are always going to be targets, but the fact that the competition is in Russia adds another layer of concern. Here are three tips to stay safer.
By Travis Jarae Founder & CEO of One World Identity, 7/10/2018
Comment0 comments  |  Read  |  Post a Comment
Former NSO Group Employee Steals, Sells Spy Tools
Dark Reading Staff, Quick Hits
The Israeli hacking firm says its stolen software is worth hundreds of millions of dollars.
By Dark Reading Staff , 7/6/2018
Comment0 comments  |  Read  |  Post a Comment
Consumers Rank Security High in Payment Decisions
Dark Reading Staff, Quick Hits
Security is a top priority when it comes to making decisions on payment methods and technologies.
By Dark Reading Staff , 7/3/2018
Comment1 Comment  |  Read  |  Post a Comment
iOS 12 2FA Feature May Carry Bank Fraud Risk
Dark Reading Staff, Quick Hits
Making two-factor authentication faster could also make it less secure.
By Dark Reading Staff , 7/2/2018
Comment0 comments  |  Read  |  Post a Comment
Botnets Evolving to Mobile Devices
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Millions of mobile devices are now making requests in what's described as "an attack on the economy."
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/28/2018
Comment0 comments  |  Read  |  Post a Comment
65% of Resold Memory Cards Still Pack Personal Data
Kelly Sheridan, Staff Editor, Dark ReadingNews
Analyzed cards, mainly from smartphones and tablets, contained private personal information, business documentation, audio, video, and photos.
By Kelly Sheridan Staff Editor, Dark Reading, 6/28/2018
Comment1 Comment  |  Read  |  Post a Comment
10 Tips for More Secure Mobile Devices
Curtis Franklin Jr., Senior Editor at Dark Reading
Mobile devices can be more secure than traditional desktop machines - but only if the proper policies and practices are in place and in use.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/27/2018
Comment2 comments  |  Read  |  Post a Comment
WPA3 Brings New Authentication and Encryption to Wi-Fi
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The Wi-Fi Alliance officially launches its latest protocol, which offers new capabilities for personal, enterprise, and IoT wireless networks.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/26/2018
Comment0 comments  |  Read  |  Post a Comment
iOS Hack Lets Attackers Brute Force iPhone, iPad Passcodes
Dark Reading Staff, Quick Hits
A vulnerability in Apple's iOS lets anyone with a Lightning cable bypass the passcode entry restriction designed to protect the company's devices.
By Dark Reading Staff , 6/25/2018
Comment2 comments  |  Read  |  Post a Comment
8 Security Tips for a Hassle-Free Summer Vacation
Steve Zurier, Freelance Writer
It's easy to let your guard down when you're away. Hackers know that, too.
By Steve Zurier Freelance Writer, 6/23/2018
Comment3 comments  |  Read  |  Post a Comment
Email, Social Media Still Security Nightmares
Dark Reading Staff, Quick Hits
Phishing and banking trojans continue to be major threats brought into the enterprise.
By Dark Reading Staff , 6/15/2018
Comment1 Comment  |  Read  |  Post a Comment
Hackers Crack iPhone Defense Built to Block Forensic Tools
Dark Reading Staff, Quick Hits
Grayshift, the company behind a system to help police break into iPhones, says it found a workaround for USB Restricted Mode.
By Dark Reading Staff , 6/15/2018
Comment1 Comment  |  Read  |  Post a Comment
Mobile App Threats Continue to Grow
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Criminals looking to profit from corporate resources and information keep going after mobile devices, two new reports confirm.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/14/2018
Comment1 Comment  |  Read  |  Post a Comment
'Shift Left' & the Connected Car
Rohit Sethi, COO of Security CompassCommentary
How improving application security in the automotive industry can shorten product development time, reduce costs, and save lives.
By Rohit Sethi COO of Security Compass, 6/12/2018
Comment1 Comment  |  Read  |  Post a Comment
5 Tips for Protecting SOHO Routers Against the VPNFilter Malware
Steve Zurier, Freelance Writer
Most home office users need to simply power cycle their routers and disable remote access; enterprises with work-at-home employees should move NAS behind the firewall.
By Steve Zurier Freelance Writer, 6/2/2018
Comment2 comments  |  Read  |  Post a Comment
Mobile Malware Moves to Mine Monero (and Other Currencies)
Dark Reading Staff, Quick Hits
A new report shows that cryptocurrencies tend to be the focus of a growing number of malicious apps.
By Dark Reading Staff , 5/30/2018
Comment1 Comment  |  Read  |  Post a Comment
Android Malware Comes Baked into Some New Tablets, Phones
Dark Reading Staff, Quick Hits
Ad-loading malware is being built into the firmware and operating system of some new tablets and phones from three major manufacturers.
By Dark Reading Staff , 5/25/2018
Comment7 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14492
PUBLISHED: 2018-07-21
Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
CVE-2018-3770
PUBLISHED: 2018-07-20
A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.
CVE-2018-3771
PUBLISHED: 2018-07-20
An XSS in statics-server <= 0.0.9 can be used via injected iframe in the filename when statics-server displays directory index in the browser.
CVE-2018-5065
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
CVE-2018-5066
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.