IoT
News & Commentary
2018 State of Cyber Workforce
Ericka Chickowski, Contributing Writer, Dark Reading
Let's start with this eye-opener: The cybersecurity profession is facing a shortfall of 3 million workers worldwide.
By Ericka Chickowski Contributing Writer, Dark Reading, 10/22/2018
Comment0 comments  |  Read  |  Post a Comment
Gartner Experts Highlight Tech Trends And Their Security Risks
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Security must be built into systems and applications from the beginning of the design process, they agreed.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 10/22/2018
Comment0 comments  |  Read  |  Post a Comment
New Security Woes for Popular IoT Protocols
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers at Black Hat Europe will detail denial-of-service and other flaws in MQTT, CoAP machine-to-machine communications protocols that imperil industrial and other IoT networks online.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/18/2018
Comment0 comments  |  Read  |  Post a Comment
(ISC) : Global Cybersecurity Workforce Short 3 Million People
Kelly Sheridan, Staff Editor, Dark ReadingNews
With the skills gap still wide, security leaders explain the challenges of hiring and retaining security experts.
By Kelly Sheridan Staff Editor, Dark Reading, 10/17/2018
Comment0 comments  |  Read  |  Post a Comment
Cybercrime-as-a-Service: No End in Sight
Marc Wilczek, Digital Strategist & CIO AdvisorCommentary
Cybercrime is easy and rewarding, making it a perfect arena for criminals everywhere.
By Marc Wilczek Digital Strategist & CIO Advisor, 10/17/2018
Comment0 comments  |  Read  |  Post a Comment
A Cybersecurity Weak Link: Linux and IoT
Migo Kedem, Senior Director of Products and Marketing at SentinelOneCommentary
Linux powers many of the IoT devices on which we've come to rely -- something that enterprises must address.
By Migo Kedem Senior Director of Products and Marketing at SentinelOne, 10/16/2018
Comment0 comments  |  Read  |  Post a Comment
Spies Among Us: Tracking, IoT & the Truly Inside Threat
Amit Sethi, Senior Principal Consultant at SynopsysCommentary
In today's ultra-connected world, it's important for users to understand how to safeguard security while browsing the web and using electronic devices.
By Amit Sethi Senior Principal Consultant at Synopsys, 10/16/2018
Comment0 comments  |  Read  |  Post a Comment
The Better Way: Threat Analysis & IIoT Security
Satish Gannu, Chief Security Officer, ABBCommentary
Threat analysis offers a more nuanced and multidimensional approach than go/no-go patching in the Industrial Internet of Things. But first, vendors must agree on how they report and address vulnerabilities.
By Satish Gannu Chief Security Officer, ABB, 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
California Enacts First-in-Nation IoT Security Law
Dark Reading Staff, Quick Hits
The new law requires some form of authentication for most connected devices.
By Dark Reading Staff , 10/1/2018
Comment0 comments  |  Read  |  Post a Comment
How to Keep Up Security in a Bug-Infested World
Matt Watchinski, Senior Director of Threat Intelligence at CiscoCommentary
Good digital hygiene will lower your risk, and these six tips can help.
By Matt Watchinski Senior Director of Threat Intelligence at Cisco, 9/27/2018
Comment0 comments  |  Read  |  Post a Comment
Security Flaw Found in Apple Mobile Device Enrollment Program
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Authentication weakness in Apple's DEP could open a window of opportunity for attackers.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 9/27/2018
Comment0 comments  |  Read  |  Post a Comment
Inside Microsoft Azure Sphere
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Microsoft engineer details how the company's IoT security solution operates - at multiple layers starting with the microcontroller.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 9/26/2018
Comment1 Comment  |  Read  |  Post a Comment
Owning Security in the Industrial Internet of Things
Satish Gannu, Chief Security Officer, ABBCommentary
Why IIoT leaders from both information technology and line-of-business operations need to join forces to develop robust cybersecurity techniques that go beyond reflexive patching.
By Satish Gannu Chief Security Officer, ABB, 9/26/2018
Comment0 comments  |  Read  |  Post a Comment
Romanian Hacker Pleads Guilty for Role in Inauguration Surveillance Ransomware
Dark Reading Staff, Quick Hits
Attack against the Metropolitan Police Department was disrupted before malware could be sent to additional systems.
By Dark Reading Staff , 9/21/2018
Comment1 Comment  |  Read  |  Post a Comment
3 Drivers Behind the Increasing Frequency of DDoS Attacks
Carlos Morales, Vice President of Global Sales Engineering and Operations at NETSCOUTCommentary
What's causing the uptick? Motivation, opportunity, and new capabilities.
By Carlos Morales Vice President of Global Sales Engineering and Operations at NETSCOUT, 9/20/2018
Comment0 comments  |  Read  |  Post a Comment
As Tech Drives the Business, So Do CISOs
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security leaders are evolving from technicians to business executives as tech drives enterprise projects, applications, and goals.
By Kelly Sheridan Staff Editor, Dark Reading, 9/19/2018
Comment0 comments  |  Read  |  Post a Comment
Mirai Hackers' Sentence Includes No Jail Time
Dark Reading Staff, Quick Hits
The trio behind Mirai sentenced to probation and public service in return for cooperation with law enforcement and researchers.
By Dark Reading Staff , 9/19/2018
Comment2 comments  |  Read  |  Post a Comment
Internet-Connected CCTV Cameras Vulnerable to 'Peekaboo' Hack
Jai Vijayan, Freelance writerNews
Zero-day flaw in China-based NUUO's video recorder technology still unfixed three months after vendor was alerted.
By Jai Vijayan Freelance writer, 9/18/2018
Comment1 Comment  |  Read  |  Post a Comment
The Top 5 Security Threats & Mitigations for Industrial Networks
Barak Perelman, CEO, IndegyCommentary
While vastly different than their IT counterparts, operational technology environments share common risks and best practices.
By Barak Perelman CEO, Indegy, 9/18/2018
Comment0 comments  |  Read  |  Post a Comment
IoT Threats Triple Since 2017
Dark Reading Staff, Quick Hits
Rapidly evolving malware is posing an ever-greater threat to the IoT and business users of the Internet.
By Dark Reading Staff , 9/18/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by vuongquocloaivat
Current Conversations thank 4 share bro
In reply to: thank 4 share bro
Post Your Own Reply
Posted by arianapham
Current Conversations good idea.I agree with you
In reply to: thank
Post Your Own Reply
More Conversations
WSJ Report: Facebook Breach the Work of Spammers, Not Nation-State Actors
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/19/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
NC Water Utility Fights Post-Hurricane Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  10/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.