Endpoint //

Privacy

News & Commentary
The Rx for HIPAA Compliance in the Cloud
Jason Polancich, CEO, MusubuCommentary
For medical entities, simply following HIPAA cloud service provider guidelines is no longer enough to ensure that your practice is protected from cyber threats, government investigations, and fines.
By Jason Polancich CEO, Musubu, 1/18/2019
Comment0 comments  |  Read  |  Post a Comment
'We Want IoT Security Regulation,' Say 95% of IT Decision-Makers
Sara Peters, Senior Editor at Dark ReadingNews
New global survey shows businesses are valuing IoT security more highly, but they are still challenged by IoT data visibility and privacy.
By Sara Peters Senior Editor at Dark Reading, 1/17/2019
Comment0 comments  |  Read  |  Post a Comment
US Judge: Police Can't Force Biometric Authentication
Dark Reading Staff, Quick Hits
Law enforcement cannot order individuals to unlock devices using facial or fingerprint scans, a California judge says.
By Dark Reading Staff , 1/15/2019
Comment2 comments  |  Read  |  Post a Comment
7 Privacy Mistakes That Keep Security Pros on Their Toes
Steve Zurier, Freelance Writer
When it comes to privacy, it's the little things that can lead to big mishaps.
By Steve Zurier Freelance Writer, 1/15/2019
Comment0 comments  |  Read  |  Post a Comment
Reddit Alerts Users to Possible Account Breaches
Dark Reading Staff, Quick Hits
User lockouts, combined with requirements for new passwords, indicate an attack on accounts at the popular social media platform.
By Dark Reading Staff , 1/10/2019
Comment0 comments  |  Read  |  Post a Comment
Consumers Demand Security from Smart Device Makers
Kelly Sheridan, Staff Editor, Dark ReadingNews
Poll shows individuals want better security from IoT device manufacturers as connected products flood the market.
By Kelly Sheridan Staff Editor, Dark Reading, 1/10/2019
Comment0 comments  |  Read  |  Post a Comment
6 Best Practices for Managing an Online Educational Infrastructure
Jamie Smith & Larry Schwarberg, Chief Information Officer; Chief Information Security Officer for University of PhoenixCommentary
Universities must keep pace with rapidly changing technology to help thwart malicious hacking attempts and protect student information.
By Jamie Smith & Larry Schwarberg Chief Information Officer; Chief Information Security Officer for University of Phoenix, 1/10/2019
Comment0 comments  |  Read  |  Post a Comment
Whitfield Diffie Joins Quantum Xchange Advisory Board
Dark Reading Staff, Quick Hits
The noted cryptography expert has joined the advisory board of the quantum key exchange provider.
By Dark Reading Staff , 1/8/2019
Comment0 comments  |  Read  |  Post a Comment
Report: Consumers Buy New Smart Devices But Don't Trust Them
Dark Reading Staff, Quick Hits
The gap between acceptance and trust for new smart devices is huge, according to a new survey.
By Dark Reading Staff , 1/7/2019
Comment1 Comment  |  Read  |  Post a Comment
Microsoft's 'Project Bali' Wants to Let You Control Your Data
Kelly Sheridan, Staff Editor, Dark ReadingNews
Currently in private beta, Bali is designed to give users control over the data Microsoft collects about them.
By Kelly Sheridan Staff Editor, Dark Reading, 1/4/2019
Comment3 comments  |  Read  |  Post a Comment
Android Malware Hits Victims in 196 Countries
Dark Reading Staff, Quick Hits
Malware disguised as games and utilities struck more than 100,000 victims before being taken out of Google Play.
By Dark Reading Staff , 1/3/2019
Comment1 Comment  |  Read  |  Post a Comment
Redefining Critical Infrastructure for the Age of Disinformation
Tim Helming, Director of Product Management, DomainToolsCommentary
In an era of tighter privacy laws, it's important to create an online environment that uses threat intelligence productively to defeat disinformation campaigns and bolster democracy.
By Tim Helming Director of Product Management, DomainTools, 1/3/2019
Comment0 comments  |  Read  |  Post a Comment
Privacy Futures: Fed-up Consumers Take Their Data Back
Andrea Little Limbago, Chief Social Scientist, VirtruCommentary
In 2019, usable security will become the new buzzword and signal a rejection of the argument that there must be a trade-off between convenience and security and privacy.
By Andrea Little Limbago Chief Social Scientist, Virtru, 12/19/2018
Comment1 Comment  |  Read  |  Post a Comment
Facebook Data Deals Extend to Microsoft, Amazon, Netflix
Kelly Sheridan, Staff Editor, Dark ReadingQuick Hits
An explosive new report sheds light on data-sharing deals that benefited 150 companies as Facebook handed over unknowing users' information.
By Kelly Sheridan Staff Editor, Dark Reading, 12/19/2018
Comment0 comments  |  Read  |  Post a Comment
Trend Micro Finds Major Flaws in HolaVPN
Dark Reading Staff, Quick Hits
A popular free VPN is found to have a very high cost for users.
By Dark Reading Staff , 12/18/2018
Comment0 comments  |  Read  |  Post a Comment
Cryptographic Erasure: Moving Beyond Hard Drive Destruction
Kaan Onarlioglu, Senior Security Researcher, AkamaiCommentary
In the good old days, incinerating backup tapes or shredding a few hard drives would have solved the problem. Today, we have a bigger challenge.
By Kaan Onarlioglu Senior Security Researcher, Akamai, 12/18/2018
Comment3 comments  |  Read  |  Post a Comment
Facebook: Photo API Bug Exposed 6.8M User Photos
Dark Reading Staff, Quick Hits
The flaw let developers access images that users may not have shared publicly, including those they started to upload but didnt post.
By Dark Reading Staff , 12/17/2018
Comment0 comments  |  Read  |  Post a Comment
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading
Security pundits predict the ways that cybercriminals, nation-state actors, and other attackers will refine their tactics, techniques, and procedures in the coming year.
By Ericka Chickowski Contributing Writer, Dark Reading, 12/14/2018
Comment3 comments  |  Read  |  Post a Comment
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Good password practices remain elusive as Dashlane's latest list of the worst password blunders can attest.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 12/12/2018
Comment7 comments  |  Read  |  Post a Comment
Mac Malware Cracks WatchGuards Top 10 List
Steve Zurier, Freelance WriterNews
Hundreds of sites also still support insecure versions of the SSL encryption protocol, the security vendor reports.
By Steve Zurier Freelance Writer, 12/12/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3906
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents.
CVE-2019-3907
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores user credentials and other sensitive information with a known weak encryption method (MD5 hash of a salt and password).
CVE-2019-3908
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data.
CVE-2019-3909
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.
CVE-2019-3910
PUBLISHED: 2019-01-18
Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.