Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint //

Privacy

News & Commentary
NRC Health Ransomware Attack Prompts Patient Data Concerns
Dark Reading Staff, Quick Hits
The organization, which sells patient administration tools to hospitals, could not confirm whether patient data was accessed.
By Dark Reading Staff , 2/21/2020
Comment0 comments  |  Read  |  Post a Comment
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff, Quick Hits
A new report shows the scale of ransomware's harm and the growth of that damage year-over-year -- an average of $141,000 per incident.
By Dark Reading Staff , 2/20/2020
Comment1 Comment  |  Read  |  Post a Comment
Avast Under Investigation by Czech Privacy Agency
Dark Reading Staff, Quick Hits
The software security maker is suspected of selling data about more than 100 million users to companies including Google, Microsoft, and Home Depot.
By Dark Reading Staff , 2/12/2020
Comment0 comments  |  Read  |  Post a Comment
Chaos & Order: The Keys to Quantum-Proof Encryption
Curtis Franklin Jr., Senior Editor at Dark Reading
The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy. But first, your current crypto needs some tidying up.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 2/12/2020
Comment0 comments  |  Read  |  Post a Comment
CIA's Secret Ownership of Crypto AG Enabled Extensive Espionage
Dark Reading Staff, Quick Hits
Crypto AG made millions selling encryption devices to more than 120 countries, which unknowingly transmitted intel back to the CIA.
By Dark Reading Staff , 2/11/2020
Comment0 comments  |  Read  |  Post a Comment
Researchers Find 24 'Dangerous' Android Apps with 382M Installs
Kelly Sheridan, Staff Editor, Dark ReadingNews
Shenzhen Hawk Internet Co. is identified as the parent company behind five app developers seeking excessive permissions in Android apps.
By Kelly Sheridan Staff Editor, Dark Reading, 2/3/2020
Comment1 Comment  |  Read  |  Post a Comment
Criminals Hide Malware Behind Grammy-Winning Cover
Dark Reading Staff, Quick Hits
Songs by Ariana Grande, Taylor Swift, and Post Malone are the most popular places.
By Dark Reading Staff , 1/29/2020
Comment0 comments  |  Read  |  Post a Comment
Why Companies Should Care about Data Privacy Day
Brad Shimmin, Distinguished AnalystCommentary
Marking yesterday's 14th anniversary of Europe's first data protection day reminds us how far we still have to go.
By Brad Shimmin Distinguished Analyst, 1/29/2020
Comment13 comments  |  Read  |  Post a Comment
Russian Brothers Sentenced to 12 Years for Fraud and Identity Theft
Dark Reading Staff, Quick Hits
The pair, based in Fort Lauderdale, Fla., were running a sophisticated credit card fraud factory.
By Dark Reading Staff , 1/28/2020
Comment0 comments  |  Read  |  Post a Comment
'CardPlanet' Operator Pleads Guilty in Federal Court
Dark Reading Staff, Quick Hits
Russian national faced multiple charges in connection with operating the marketplace for stolen credit-card credentials, and a forum for VIP criminals to offer their services.
By Dark Reading Staff , 1/24/2020
Comment0 comments  |  Read  |  Post a Comment
Weathering the Privacy Storm from GDPR to CCPA & PDPA
Mark McClain, CEO & Co-founderCommentary
A general approach to privacy, no matter the regulation, is the only way companies can avoid a data protection disaster in 2020 and beyond.
By Mark McClain CEO & Co-founder, 1/23/2020
Comment0 comments  |  Read  |  Post a Comment
Why DPOs and CISOs Must Work Closely Together
Rajesh Ganesan, Vice President at ManageEngineCommentary
Recent data protection laws mean that the data protection officer and CISO must work in tandem to make sure users' data is protected.
By Rajesh Ganesan Vice President at ManageEngine, 1/22/2020
Comment0 comments  |  Read  |  Post a Comment
Avoid That Billion-Dollar Fine: Blurring the Lines Between Security and Privacy
Jean-Michel Franco, Senior Director of Product Marketing at TalendCommentary
While doing good for the user is the theoretical ideal, the threat of fiscal repercussions should drive organizations to take privacy seriously. That means security and data privacy teams must work more closely.
By Jean-Michel Franco Senior Director of Product Marketing at Talend, 1/21/2020
Comment0 comments  |  Read  |  Post a Comment
Data Awareness Is Key to Data Security
Moti Gindi, Corporate Vice President, Microsoft Defender Advanced Threat ProtectionCommentary
Traditional data-leak prevention is not enough for businesses facing today's dynamic threat landscape.
By Moti Gindi Corporate Vice President, Microsoft Defender Advanced Threat Protection, 1/21/2020
Comment0 comments  |  Read  |  Post a Comment
Consumer Reports Calls for IoT Manufacturers to Raise Security Standards
Dark Reading Staff, Quick Hits
A letter to 25 companies says Consumer Reports will change ratings to reflect stronger security and privacy standards.
By Dark Reading Staff , 1/14/2020
Comment0 comments  |  Read  |  Post a Comment
CCPA Kickoff: What Businesses Need to Know
Kelly Sheridan, Staff Editor, Dark ReadingNews
The California Consumer Privacy Act is in full effect, prompting organizations to think about how they'll remain compliant.
By Kelly Sheridan Staff Editor, Dark Reading, 1/2/2020
Comment0 comments  |  Read  |  Post a Comment
Ambiguity Around CCPA Will Lead to a Slow Start in 2020
Anurag Kahol, CTO, BitglassCommentary
But longer term, compliance to California's new privacy law represents an opportunity for companies to increase customer trust and market share.
By Anurag Kahol CTO, Bitglass, 12/20/2019
Comment0 comments  |  Read  |  Post a Comment
VPN Flaw Allows Criminal Access to Everything on Victims' Computers
Dark Reading Staff, Quick Hits
Vulnerability in the Aviatrix VPN client, since patched, gives an attacker unlimited access to a breached system.
By Dark Reading Staff , 12/5/2019
Comment2 comments  |  Read  |  Post a Comment
How to Get Prepared for Privacy Legislation
Tony Anscombe, Global Security Evangelist & Industry Partnership Ambassador at ESETCommentary
All the various pieces of legislation, both in the US and worldwide, can feel overwhelming. But getting privacy basics right is a solid foundation.
By Tony Anscombe Global Security Evangelist & Industry Partnership Ambassador at ESET, 11/27/2019
Comment9 comments  |  Read  |  Post a Comment
The Implications of Last Week's Exposure of 1.2B Records
Kelly Sheridan, Staff Editor, Dark ReadingNews
Large sums of organized data, whether public or private, are worth their weight in gold to cybercriminals.
By Kelly Sheridan Staff Editor, Dark Reading, 11/26/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by YorkLawFirm
Current Conversations Thanks for sharing    
In reply to: Feedback
Post Your Own Reply
More Conversations
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8818
PUBLISHED: 2020-02-25
An issue was discovered in the CardGate Payments plugin through 2.0.30 for Magento 2. Lack of origin authentication in the IPN callback processing function in Controller/Payment/Callback.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore...
CVE-2020-8819
PUBLISHED: 2020-02-25
An issue was discovered in the CardGate Payments plugin through 3.1.15 for WooCommerce. Lack of origin authentication in the IPN callback processing function in cardgate/cardgate.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass ...
CVE-2020-9385
PUBLISHED: 2020-02-25
A NULL Pointer Dereference exists in libzint in Zint 2.7.1 because multiple + characters are mishandled in add_on in upcean.c, when called from eanx in upcean.c during EAN barcode generation.
CVE-2020-9382
PUBLISHED: 2020-02-24
An issue was discovered in the Widgets extension through 1.4.0 for MediaWiki. Improper title sanitization allowed for the execution of any wiki page as a widget (as defined by this extension) via MediaWiki's } parser function.
CVE-2020-1938
PUBLISHED: 2020-02-24
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that ...