Mobile
News & Commentary
DoubleLocker Delivers Unique Two-Punch Hit to Android
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Combines Android ransomware with capability to change users device PINs.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/13/2017
Comment0 comments  |  Read  |  Post a Comment
IoT: Insecurity of Things or Internet of Threats?
Kelly Sheridan, Associate Editor, Dark ReadingNews
Security leaders call for device manufacturers to buckle down on device security as the Internet of Things evolves.
By Kelly Sheridan Associate Editor, Dark Reading, 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
Akamai Acquires Nominum
Dark Reading Staff, Quick Hits
Purchase of DNS and enterprise cybersecurity solutions company is designed to bolster Akamai's offering to telecom carriers.
By Dark Reading Staff , 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
Key New Security Features in Android Oreo
Dawn Kawamoto, Associate Editor, Dark Reading
Android 8.0 Oreo marks a major revamp of Google's mobile operating system, putting in a number of new security-hardening measures.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/10/2017
Comment1 Comment  |  Read  |  Post a Comment
New 4G, 5G Network Flaw 'Worrisome'
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Weaknesses in the voice and data convergence technology can be exploited to allow cybercriminals to launch DoS attacks and hijack mobile data.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/9/2017
Comment0 comments  |  Read  |  Post a Comment
John Kelly's Personal Phone Compromised
Dark Reading Staff, Quick Hits
Officials fear foreign entities may have accessed White House chief of staff Kelly's phone while he was secretary of Homeland Security.
By Dark Reading Staff , 10/6/2017
Comment0 comments  |  Read  |  Post a Comment
70% of US Employees Lack Security and Privacy Awareness
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Acceptable use of social media and adherence to workplace physical security drops, new survey shows.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/3/2017
Comment3 comments  |  Read  |  Post a Comment
FBI Won't Have to Reveal iPhone-Cracking Tool Used in Terror Case
Jai Vijayan, Freelance writerNews
Revealing vendor's name and pricing details a threat to national security, DC court says.
By Jai Vijayan Freelance writer, 10/2/2017
Comment1 Comment  |  Read  |  Post a Comment
Mobile Ransomware Hits Browsers with Old-School Techniques
Kelly Sheridan, Associate Editor, Dark ReadingNews
Several types of malware sold on the dark Web advertise the ability to spy on Android smartphones, encrypt files, and demand payment.
By Kelly Sheridan Associate Editor, Dark Reading, 9/20/2017
Comment1 Comment  |  Read  |  Post a Comment
How Apple's New Facial Recognition Technology Will Change Enterprise Security
Shimrit Tzur-David, CTO & Co-founder, Secret Double OctopusCommentary
Expect a trickle-down effect, as tech similar to Face ID becomes offered outside of Apple.
By Shimrit Tzur-David CTO & Co-founder, Secret Double Octopus, 9/19/2017
Comment0 comments  |  Read  |  Post a Comment
Experts Weigh Pros, Cons of FaceID Authentication in iPhone X
Kelly Sheridan, Associate Editor, Dark ReadingNews
Security pros discuss Apple's decision to swap fingerprint scanning for facial recognition technology in the latest iPhone.
By Kelly Sheridan Associate Editor, Dark Reading, 9/13/2017
Comment0 comments  |  Read  |  Post a Comment
10 Ways to Prevent Your Mobile Devices From Becoming Bots
Dawn Kawamoto, Associate Editor, Dark Reading
Enterprises may not notice a huge impact on their network's bandwidth, but other repercussions may loom in the background.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/13/2017
Comment0 comments  |  Read  |  Post a Comment
New Android 'Toast' Vuln Makes Overlay Attacks Easier
Dawn Kawamoto, Associate Editor, Dark ReadingNews
The vast majority of Android devices are at risk of a 'Toast' overlay attack that builds on Cloak and Dagger exploits. The bug could lead to remote control of the device unless Google's latest security patch is applied.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/8/2017
Comment0 comments  |  Read  |  Post a Comment
7 Tips to Fight Gmail Phishing Attacks
Kelly Sheridan, Associate Editor, Dark Reading
Popular email platforms like Gmail are prime phishing targets. Admins can adopt these steps to keep attackers at bay.
By Kelly Sheridan Associate Editor, Dark Reading, 9/8/2017
Comment0 comments  |  Read  |  Post a Comment
Activists Beware: The Latest In 3G & 4G Spying
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Ravi Borgaonkar describes new 3G & 4G vulnerabilities that enable IMSI catchers to be smarter, stealthier snoopers.
By Sara Peters Senior Editor at Dark Reading, 9/5/2017
Comment0 comments  |  Read  |  Post a Comment
7 Things to Know About Today's DDoS Attacks
Jai Vijayan, Freelance writer
DDoS attacks are no longer something that just big companies in a few industries need to worry about. They have become a threat to every business.
By Jai Vijayan Freelance writer, 8/30/2017
Comment1 Comment  |  Read  |  Post a Comment
Apple iOS Exploit Takes Complete Control of Kernel
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Researcher demonstrates 'severe' ZIVA exploit at Hack in the Box.
By Dawn Kawamoto Associate Editor, Dark Reading, 8/24/2017
Comment1 Comment  |  Read  |  Post a Comment
IoT Medical Devices a Major Security Worry in Healthcare, Survey Shows
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Healthcare providers, manufacturers, and regulators say cybersecurity risks of IoT medical devices and connected legacy systems a top concern.
By Dawn Kawamoto Associate Editor, Dark Reading, 8/15/2017
Comment0 comments  |  Read  |  Post a Comment
Broadcom Chipset Bug in Android, iOS Smartphones Allows Remote Attack
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Security researcher found a common flaw in Android and iOS smartphone chipsets that could allow a remote exploit to be unleashed on millions of devices.
By Dawn Kawamoto Associate Editor, Dark Reading, 7/27/2017
Comment1 Comment  |  Read  |  Post a Comment
Facebook Offers $1 Million for New Security Defenses
Dawn Kawamoto, Associate Editor, Dark ReadingNews
The social media giant has increased the size of its Internet Defense Prize program in order to spur more research into ways to defend users against the more prevalent and common methods of attack.
By Dawn Kawamoto Associate Editor, Dark Reading, 7/26/2017
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Cybersecurity's 'Broken' Hiring Process
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/11/2017
How Systematic Lying Can Improve Your Security
Lance Cottrell, Chief Scientist, Ntrepid,  10/11/2017
Ransomware Grabs Headlines but BEC May Be a Bigger Threat
Marc Wilczek, Digital Strategist & CIO Advisor,  10/12/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.