Risk

News & Commentary
To Be Ready for the Security Future, Pay Attention to the Security Past
Liz Maida,  Co-founder, CEO & CTO, Uplevel SecurityCommentary
It's easy to just move on to the next problem, ignoring what's happened -- but that's a mistake.
By Liz Maida Co-founder, CEO & CTO, Uplevel Security, 9/18/2017
Comment3 comments  |  Read  |  Post a Comment
Public, Hybrid Cloud Security Fears Abound
Kelly Sheridan, Associate Editor, Dark ReadingNews
Most CISOs say encryption is the most effective security tool for data in the public cloud, but only one in six encrypt all data stored there.
By Kelly Sheridan Associate Editor, Dark Reading, 9/16/2017
Comment0 comments  |  Read  |  Post a Comment
OurMine Claims Vevo Hack, Releases 3.12TB of Data
Dark Reading Staff, Quick Hits
Group known for claiming responsibility for hacking Mark Zuckerberg's Twitter account and the WikiLeaks' DNS attack says it's behind the Vevo breach.
By Dark Reading Staff , 9/16/2017
Comment1 Comment  |  Read  |  Post a Comment
Senators Propose US Elections Cybersecurity Commission
Dark Reading Staff, Quick Hits
The proposed commission would aim to review the 2016 election process and safeguard future elections from interference.
By Dark Reading Staff , 9/15/2017
Comment0 comments  |  Read  |  Post a Comment
Attacks on Android Soared 40% in Q2
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Despite a rise in attacks, the average number of malicious variants remains surprisingly limited, according to a report from Avast.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/15/2017
Comment1 Comment  |  Read  |  Post a Comment
Cloud Security's Shared Responsibility Is Foggy
Ben Johnson, Co-founder and CTO, Obsidian SecurityCommentary
Security is a two-way street. The cloud provider isn't the only one that must take precautions.
By Ben Johnson Co-founder and CTO, Obsidian Security, 9/14/2017
Comment3 comments  |  Read  |  Post a Comment
Encryption: A New Boundary for Distributed Infrastructure
Rob Enns, VP Engineering, Bracket ComputingCommentary
As the sheet metal surrounding traditional infrastructure continues to fall away, where should security functions in a cloud environment reside?
By Rob Enns VP Engineering, Bracket Computing, 9/14/2017
Comment0 comments  |  Read  |  Post a Comment
Trump Orders Removal of Kaspersky Products from Federal Systems
Dark Reading Staff, Quick Hits
The president cites concern that the Russia-based company could be influenced by the Kremlin.
By Dark Reading Staff , 9/13/2017
Comment1 Comment  |  Read  |  Post a Comment
Businesses Fail to Properly Secure, Assess SSH: ISACA
Kelly Sheridan, Associate Editor, Dark ReadingQuick Hits
Frequently used but underappreciated, Secure Shell is rarely secured, assessed, documented, or managed in a systematic way, researchers report.
By Kelly Sheridan Associate Editor, Dark Reading, 9/13/2017
Comment0 comments  |  Read  |  Post a Comment
5 Problems That Keep CISOs Awake at Night
Joshua Douglas, Chief Strategy Officer, RaytheonCommentary
The last few years have shown a big difference in the way cyber-risks are acknowledged, but progress still needs to be made.
By Joshua Douglas Chief Strategy Officer, Raytheon, 9/13/2017
Comment0 comments  |  Read  |  Post a Comment
China to Create Data Repository to Log Cyberattacks
Dark Reading Staff, Quick Hits
Telcos, government agencies, Internet companies, and domain-name organizations to file cybersecurity information.
By Dark Reading Staff , 9/13/2017
Comment0 comments  |  Read  |  Post a Comment
20 Questions to Help Achieve Security Program Goals
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRACommentary
There are always projects, maturity improvements, and risk mitigation endeavors on the horizon. Here's how to keep them from drifting into the sunset.
By Joshua Goldfarb Co-founder & Chief Product Officer, IDDRA, 9/13/2017
Comment0 comments  |  Read  |  Post a Comment
Why InfoSec Hiring Managers Miss the Oasis in the Desert
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Despite a sharp shortage of IT security professionals, a pool of potential talent is swimming below the surface.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/13/2017
Comment0 comments  |  Read  |  Post a Comment
Shopify Risk Director Talks Ecommerce, Bug Bounty Program
Kelly Sheridan, Associate Editor, Dark ReadingNews
Andrew Dunbar shares his experience growing a retail-focused security team, and combating the many threats facing online merchants and their customers.
By Kelly Sheridan Associate Editor, Dark Reading, 9/12/2017
Comment0 comments  |  Read  |  Post a Comment
Deception: A Convincing New Approach to Cyber Defense
Ofer Israeli, CEO & Founder, illusive networksCommentary
How defenders in a US national security agency capture-the-flag exercise used an endless stream of false data across the network to thwart attackers and contain damage.
By Ofer Israeli CEO & Founder, illusive networks, 9/12/2017
Comment0 comments  |  Read  |  Post a Comment
Spain Slaps Facebook with a 1.2 Million Euro Privacy Violation Fine
Dark Reading Staff, Quick Hits
Three infringements - one 'very serious' - of the country's data protection law are cited by the Spanish regulatory agency.
By Dark Reading Staff , 9/11/2017
Comment2 comments  |  Read  |  Post a Comment
New Android 'Toast' Vuln Makes Overlay Attacks Easier
Dawn Kawamoto, Associate Editor, Dark ReadingNews
The vast majority of Android devices are at risk of a 'Toast' overlay attack that builds on Cloak and Dagger exploits. The bug could lead to remote control of the device unless Google's latest security patch is applied.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/8/2017
Comment0 comments  |  Read  |  Post a Comment
If Blockchain Is the Answer, What Is the Security Question?
Duncan Jones, Head of Skunkworks, Thales e-SecurityCommentary
Like any technology, blockchain has its strengths and weaknesses. But debunking three common myths can help you cut through the hype.
By Duncan Jones Head of Skunkworks, Thales e-Security, 9/8/2017
Comment0 comments  |  Read  |  Post a Comment
38% of Attorneys Fail to Disclose Cybersecurity Issues to Board
Dark Reading Staff, Quick Hits
Directors increasingly find themselves held accountable for cybersecurity breaches at their companies.
By Dark Reading Staff , 9/8/2017
Comment1 Comment  |  Read  |  Post a Comment
Attacking Data Integrity & Hacking Radiation Monitoring Devices
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Ruben Santamarta shows radio-based vulnerabilities and investigates how the integrity of critical data can be manipulated to simulate, complicate or exacerbate emergency situations.
By Sara Peters Senior Editor at Dark Reading, 9/8/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Cloud Security's Shared Responsibility Is Foggy
Ben Johnson, Co-founder and CTO, Obsidian Security,  9/14/2017
To Be Ready for the Security Future, Pay Attention to the Security Past
Liz Maida, Co-founder, CEO & CTO, Uplevel Security,  9/18/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.