Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

News & Commentary
Mobile Exploit Fingerprints Devices with Sensor Calibration Data
Dark Reading Staff, Quick Hits
Data from routines intended to calibrate motion sensors can identify individual iOS and Android devices in a newly released exploit.
By Dark Reading Staff , 5/23/2019
Comment0 comments  |  Read  |  Post a Comment
Google to Replace Titan Security Keys Affected by Bluetooth Bug
Kelly Sheridan, Staff Editor, Dark ReadingNews
A misconfiguration in Bluetooth Titan Security Keys' pairing protocols could compromise users under specific circumstances.
By Kelly Sheridan Staff Editor, Dark Reading, 5/16/2019
Comment0 comments  |  Read  |  Post a Comment
Introducing the Digital Transformation Architect
Jordan Blake, VP of Products at BehavioSecCommentary
Bet-the-company transformation that expands the attack surface requires close alignment and leadership across executive, IT and security teams.
By Jordan Blake VP of Products at BehavioSec, 5/15/2019
Comment0 comments  |  Read  |  Post a Comment
Commercial Spyware Uses WhatsApp Flaw to Infect Phones
Robert Lemos, Contributing WriterNews
A single flaw allowed attackers thought to be linked to a government to target human rights workers and install surveillance software by sending a phone request. The victims did not even have to answer.
By Robert Lemos Contributing Writer, 5/14/2019
Comment0 comments  |  Read  |  Post a Comment
Social Engineering Slams the C-Suite: Verizon DBIR
Kelly Sheridan, Staff Editor, Dark ReadingNews
Criminals are also going after cloud-based email accounts, according to Verizon's '2019 Data Breach Investigations Report.'
By Kelly Sheridan Staff Editor, Dark Reading, 5/8/2019
Comment0 comments  |  Read  |  Post a Comment
Better Behavior, Better Biometrics?
Rajiv Dholakia, VP Products, Nok Nok LabsCommentary
Behavioral biometrics is a building block to be used in conjunction with other security measures, but it shows promise.
By Rajiv Dholakia VP Products, Nok Nok Labs, 5/7/2019
Comment0 comments  |  Read  |  Post a Comment
Security Top Concern as Mobile Providers Think 5G
Kelly Sheridan, Staff Editor, Dark ReadingNews
The deployment of 5G networks will bring new use cases and revenue opportunities, mobile providers say, but security will be essential.
By Kelly Sheridan Staff Editor, Dark Reading, 5/6/2019
Comment0 comments  |  Read  |  Post a Comment
App Exposes Wi-Fi Credentials for Thousands of Private Networks
Dark Reading Staff, Quick Hits
A database used by WiFi Finder was left open and unprotected on the Internet.
By Dark Reading Staff , 4/23/2019
Comment2 comments  |  Read  |  Post a Comment
7 Tips for an Effective Employee Security Awareness Program
Jai Vijayan, Contributing Writer
Breaches and compliance requirements have heightened the need for continuous and effective employee training, security experts say.
By Jai Vijayan Contributing Writer, 4/17/2019
Comment1 Comment  |  Read  |  Post a Comment
Meet Scranos: New Rootkit-Based Malware Gains Confidence
Kelly Sheridan, Staff Editor, Dark ReadingNews
The cross-platform operation, first tested on victims in China, has begun to spread around the world.
By Kelly Sheridan Staff Editor, Dark Reading, 4/16/2019
Comment1 Comment  |  Read  |  Post a Comment
New Android Malware Adds Persistence, Targets Australian Banking Customers
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Malware campaign, which finds and exfiltrates a user's contact list and banking credentials, could potentially grow to global proportions.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/10/2019
Comment0 comments  |  Read  |  Post a Comment
Android Phones Now Double as Physical Security Keys
Kelly Sheridan, Staff Editor, Dark ReadingNews
Google debuted a series of security updates at Next 2019, giving users the option to use their phone as a second authentication factor.
By Kelly Sheridan Staff Editor, Dark Reading, 4/10/2019
Comment1 Comment  |  Read  |  Post a Comment
'MuddyWater' APT Spotted Attacking Android
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Cyber espionage attack group adds mobile malware to its toolset.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/10/2019
Comment1 Comment  |  Read  |  Post a Comment
Stop Mocking & Start Enabling Emerging Technologies
Rick Holland, Chief Information Security Officer and Vice President of  Strategy at Digital ShadowsCommentary
Mocking new technology isn't productive and can lead to career disadvantage.
By Rick Holland Chief Information Security Officer and Vice President of Strategy at Digital Shadows, 4/9/2019
Comment0 comments  |  Read  |  Post a Comment
8 Steps to More Effective Small Business Security
Curtis Franklin Jr., Senior Editor at Dark Reading
Small business face the same security challenges as large enterprises but with much smaller security teams. Here are 8 things to do to get the most from yours.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/8/2019
Comment1 Comment  |  Read  |  Post a Comment
Phishing Campaign Targeting Verizon Mobile Users
Steve Zurier, Contributing WriterNews
Lookout Phishing AI, which discovered the attack, says it has been going on since late November.
By Steve Zurier Contributing Writer, 4/5/2019
Comment1 Comment  |  Read  |  Post a Comment
How iOS App Permissions Open Holes for Hackers
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The permissions iOS apps request from users can turn the devices into spy tools and provide a toehold into the enterprise network, according to new research.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/4/2019
Comment0 comments  |  Read  |  Post a Comment
Major Mobile Financial Apps Harbor Built-in Vulnerabilities
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
A wide variety of financial services companies' apps suffer from poor programing practices and unshielded data.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/2/2019
Comment1 Comment  |  Read  |  Post a Comment
Nuanced Approach Needed to Deal With Huawei 5G Security Concerns
Jai Vijayan, Contributing WriterNews
Governments need to adopt strategic approach for dealing with concerns over telecom vendor's suspected ties to China's intelligence apparatus, NATO-affiliated body says.
By Jai Vijayan Contributing Writer, 4/1/2019
Comment3 comments  |  Read  |  Post a Comment
In the Race Toward Mobile Banking, Don't Forget Risk Management
Sam Abadir, Vice President of Industry Solutions at LockpathCommentary
The rise of mobile banking and payment services has sparked widespread adoption, making a focus on risk essential.
By Sam Abadir Vice President of Industry Solutions at Lockpath, 4/1/2019
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by lisarboutte
Current Conversations Wooow its greeaat)
In reply to: Great
Post Your Own Reply
More Conversations
PR Newswire
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
How Security Vendors Can Address the Cybersecurity Talent Shortage
Rob Rashotte, VP of Global Training and Technical Field Enablement at Fortinet,  5/24/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7068
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7069
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7070
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7071
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
CVE-2019-7072
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .