Endpoint //

Privacy

News & Commentary
GDPR, WHOIS & the Impact on Merchant Risk Security Monitoring
Ron Teicher, CEO & Founder, EverCompliantCommentary
The EU's General Data Protection Regulation will make it harder for law enforcement, forensic investigators, and others to track down everything from credit card fraud to child porn rings.
By Ron Teicher CEO & Founder, EverCompliant, 5/24/2018
Comment0 comments  |  Read  |  Post a Comment
Privacy Survey Says: Americans Don't Want to Sell Their Data
Dark Reading Staff, Quick Hits
A new survey shows the extent to which Americans are reluctant to sell their personal information for any price.
By Dark Reading Staff , 5/24/2018
Comment1 Comment  |  Read  |  Post a Comment
A Data Protection Officer's Guide to the Post-GDPR Deadline Reality
Jen Brown, Compliance and Data Protection Officer at Sumo LogicCommentary
The EU's General Data Protection Regulation deadline is here -- now what? These four tips can help guide your next steps.
By Jen Brown Compliance and Data Protection Officer at Sumo Logic, 5/24/2018
Comment0 comments  |  Read  |  Post a Comment
The Good & Bad News about Blockchain Security
Michael Raziel, CTO, CyberGuild VenturesCommentary
Blockchain technology promises many things. But to succeed, it must offer users a better plan against hackers.
By Michael Raziel CTO, CyberGuild Ventures, 5/23/2018
Comment0 comments  |  Read  |  Post a Comment
What Should Post-Quantum Cryptography Look Like?
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Researchers are tackling the difficult problem of transitioning toward a new mode of cryptographic protections that won't break under the pressure of quantum computing power.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/23/2018
Comment1 Comment  |  Read  |  Post a Comment
GDPR 101: Keeping Data Safe Throughout the 'Supply Chain'
Marc French, Senior VP, Chief Trust Officer & Data Protection Officer, MimecastCommentary
There are a lot of moving pieces involved with data collection, retention, and processing in the EU's new General Data Protection Regulation. Here's how to break down responsibilities between your security team and service providers.
By Marc French Senior VP, Chief Trust Officer & Data Protection Officer, Mimecast, 5/22/2018
Comment0 comments  |  Read  |  Post a Comment
'Roaming Mantis' Android Malware Evolves, Expands Targets
Dark Reading Staff, Quick Hits
Roaming Mantis has evolved rapidly, adding geographies, platforms, and capabilities to its original scope.
By Dark Reading Staff , 5/21/2018
Comment1 Comment  |  Read  |  Post a Comment
Get Ready for 'WannaCry 2.0'
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Another widespread worm attack is "inevitable," but spreading a different more lucrative or destructive payload, experts say.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/17/2018
Comment0 comments  |  Read  |  Post a Comment
Tanium's Valuation Reaches $5 Billion With New Investment
Dark Reading Staff, Quick Hits
Tanium has received a $175 million investment from TPG Growth.
By Dark Reading Staff , 5/17/2018
Comment0 comments  |  Read  |  Post a Comment
Why Isn't Integrity Getting the Attention It Deserves?
Tim Erlin, VP of Product Management & Strategy at TripwireCommentary
A focus on integrity requires a shift in the way many approach security management, but it's one of the most promising approaches to effective enterprise security.
By Tim Erlin VP of Product Management & Strategy at Tripwire, 5/17/2018
Comment0 comments  |  Read  |  Post a Comment
Newly Discovered Malware Targets Telegram Desktop
Kelly Sheridan, Staff Editor, Dark ReadingNews
Russian-speaking attacker behind new malware capable of lifting credentials, cookies, desktop cache, and key files.
By Kelly Sheridan Staff Editor, Dark Reading, 5/16/2018
Comment0 comments  |  Read  |  Post a Comment
FIDO Alliance Appoints Facebook to Board of Directors
Dark Reading Staff, Quick Hits
Facebook joins Google, Microsoft, Amazon, and Intel, all among major influential tech companies backing FIDO authentication.
By Dark Reading Staff , 5/16/2018
Comment0 comments  |  Read  |  Post a Comment
IT Pros Worried About IoT But Not Prepared to Secure It
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Few organizations have a security policy in place for Internet of Things devices, new survey shows.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/16/2018
Comment1 Comment  |  Read  |  Post a Comment
Rail Europe Notifies Riders of Three-Month Data Breach
Dark Reading Staff, Quick Hits
Rail Europe North America alerts customers to a security incident in which hackers planted card-skimming malware on its website.
By Dark Reading Staff , 5/15/2018
Comment0 comments  |  Read  |  Post a Comment
Smashing Silos and Building Bridges in the IT-Infosec Divide
Kelly Sheridan, Staff Editor, Dark ReadingNews
A strong relationship between IT and security leads to strong defense, but it's not always easy getting the two to collaborate.
By Kelly Sheridan Staff Editor, Dark Reading, 5/14/2018
Comment0 comments  |  Read  |  Post a Comment
'EFAIL' Email Encryption Flaw Research Stirs Debate
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
A newly revealed vulnerability in email encryption is a big problem for a small subset of users.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/14/2018
Comment0 comments  |  Read  |  Post a Comment
Facebook Suspends 200 Apps
Dark Reading Staff, Quick Hits
Thousands of apps have been investigated as Facebook determines which had access to large amounts of user data before its 2014 policy changes.
By Dark Reading Staff , 5/14/2018
Comment0 comments  |  Read  |  Post a Comment
Risky Business: Deconstructing Ray Ozzie's Encryption Backdoor
Adam Shostack, Founder, Stealth StartupCommentary
With the addition of secure enclaves, secure boot, and related features of "Clear," the only ones that will be able to test this code are Apple, well-resourced nations, and vendors who sell jailbreaks.
By Adam Shostack Founder, Stealth Startup, 5/10/2018
Comment0 comments  |  Read  |  Post a Comment
Script Kiddies, Criminals Hacking Video Streams for Fun & Profit
Dark Reading Staff, Quick Hits
Video streams are getting hijacked for 'prestige,' DDoS, and financial gain, a new report found.
By Dark Reading Staff , 5/9/2018
Comment0 comments  |  Read  |  Post a Comment
Phishing Threats Move to Mobile Devices
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Mobile devices are emerging as a primary gateway for phishing attacks aimed at stealing data.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/9/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
What Israel's Elite Defense Force Unit 8200 Can Teach Security about Diversity
Lital Asher-Dotan, Senior Director, Security Research and Content, Cybereason,  5/21/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Shhh!  They're watching... And you have a laptop?  
Current Issue
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-3018
PUBLISHED: 2018-05-24
The AXIS webapp in deploy-tomcat/axis in IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 allows remote attackers to obtain sensitive configuration information via a direct request, as demonstrated by happyaxis.jsp. IBM X-Force ID: 84354.
CVE-2013-3023
PUBLISHED: 2018-05-24
IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 might allow remote attackers to obtain sensitive information about Tomcat credentials by sniffing the network for a session in which HTTP is used. IBM X-Force ID: 84361.
CVE-2013-3024
PUBLISHED: 2018-05-24
IBM WebSphere Application Server (WAS) 8.5 through 8.5.0.2 on UNIX allows local users to gain privileges by leveraging improper process initialization. IBM X-Force ID: 84362.
CVE-2018-5674
PUBLISHED: 2018-05-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
CVE-2018-5675
PUBLISHED: 2018-05-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...