Dark Reading

Hacking on TV: 8 Binge-Worthy and Cringe-Worthy Examples

02/28/2018
From the psycho-drama Mr. Robot to portraying the outright dangers of ransomware taking down a hospital in Grey's Anatomy, hacking themes now run deep in today's TV shows.

Why Cryptocurrencies Are Dangerous for Enterprises

02/28/2018
When employees mine coins with work computers, much can go wrong. But there are some ways to stay safe.

How to Secure 'Permissioned' Blockchains

02/28/2018
At the heart of every blockchain is a protocol that agrees to the order and security of transactions in the next block. Here's how to maintain the integrity of the chain.

Nearly Half of Cybersecurity Pros Solicited Weekly by Recruiters

02/28/2018
More than 80% say they are 'open' to new job offers, while 15% are actively on the search, a new (ISC)2 survey shows.

Virtual Private Networks: Why Their Days Are Numbered

02/28/2018
As companies move to the cloud and depend less on physical servers and network connections, their reliance on VPNs for security will eventually evolve, if not disappear altogether.

Nation-State Hackers Adopt Russian 'Maskirovka' Strategy

02/27/2018
New CrowdStrike report shows blurring of state-sponsored and cybercrime hacking methods.

Memcached Servers Being Exploited in Huge DDoS Attacks

02/27/2018
Multiple vendors this week say they have seen a recent spike in UDP attacks coming in via port 11211.

NSA's Rogers: No White House Request for Action Against Russian Hacking

02/27/2018
US Cyber Command head Michael Rogers told US Senate Armed Services Committee that actions to deter Russian hackers from interfering with upcoming US elections requires an order from the White House.

SAML Flaw Lets Hackers Assume Users' Identities

02/27/2018
Vulnerability affects single sign-on for SAML-reliant services including OneLogin, Duo Security, Clever, and OmniAuth.

Security Starts with the User Experience

02/27/2018
Preventing a data breach is safer and more cost-effective than dealing with a breach after it has already happened. That means a focus on security in the design phase.

Incident 'Management': What IT Security Can Learn from Public Safety

02/27/2018
How a framework developed for fighting California wildfires back in the '70s can fortify first responders to a modern cyberattack.

Splunk to Acquire Phantom

02/27/2018
$350 million deal scheduled to close Q1 2018.

Misleading Cyber Foes with Deception Technology

02/27/2018
Today's deception products go far beyond the traditional honeypot by catching attackers while they are chasing down non-existent targets inside your networks.

Threats from Mobile Ransomware & Banking Malware Are Growing

02/26/2018
The number of unique mobile malware samples increased sharply in 2017 compared to a year ago, according to Trend Micro.

Adobe Flash Vulnerability Reappears in Malicious Word Files

02/26/2018
CVE-2018-4878, a Flash zero-day patched earlier this month, has resurfaced in another campaign as attackers capitalize on the bug.

PhishMe Acquired, Rebranded as Cofense in $400M Deal

02/26/2018
Cofense is the new name for PhishMe, which was purchased by a private equity consortium.

7 Key Stats that Size Up the Cybercrime Deluge

02/26/2018
Updated data on zero-days, IoT threats, cryptomining, and economic costs should keep eyebrows raised in 2018.

6 Cybersecurity Trends to Watch

02/26/2018
Expect more as the year goes on: more breaches, more IoT attacks, more fines...

93% of Cloud Applications Aren't Enterprise-Ready

02/23/2018
The average business uses 1,181 cloud services, and most don't meet all recommended security requirements, Netskope says.

'OMG': New Mirai Variant Converts IoT Devices into Proxy Servers

02/23/2018
The new malware also can turn bots into DDoS attack machines, says Fortinet.