Endpoint

News & Commentary
Hackers Found Phishing for Facebook Credentials
Dark Reading Staff, Quick Hits
A "very realistic-looking" login prompt is designed to capture users' Facebook credentials, researchers report.
By Dark Reading Staff , 2/15/2019
Comment0 comments  |  Read  |  Post a Comment
Post-Quantum Crypto Standards Arent All About the Math
Ericka Chickowski, Contributing Writer, Dark ReadingNews
The industry needs to keep in mind the realities of hardware limits and transitional growing pains, according to Microsoft, Utimaco researchers.
By Ericka Chickowski Contributing Writer, Dark Reading, 2/15/2019
Comment0 comments  |  Read  |  Post a Comment
White-Hat Bug Bounty Programs Draw Inspiration from the Old West
Michelle Moore, Academic Director and Adjunct Professor, University of San DiegoCommentary
These programs are now an essential strategy in keeping the digital desperados at bay.
By Michelle Moore Academic Director and Adjunct Professor, University of San Diego, 2/15/2019
Comment0 comments  |  Read  |  Post a Comment
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark ReadingNews
In the weeks leading up to Valentine's Day 2019, researchers notice a new form of Gandcrab appearing in romance-themed emails.
By Kelly Sheridan Staff Editor, Dark Reading, 2/14/2019
Comment1 Comment  |  Read  |  Post a Comment
Security Spills: 9 Problems Causing the Most Stress
Kelly Sheridan, Staff Editor, Dark Reading
Security practitioners reveal what's causing them the most frustration in their roles.
By Kelly Sheridan Staff Editor, Dark Reading, 2/14/2019
Comment0 comments  |  Read  |  Post a Comment
Researchers Dig into Microsoft Office Functionality Flaws
Kelly Sheridan, Staff Editor, Dark ReadingNews
An ongoing study investigating security bugs in Microsoft Office has so far led to two security patches.
By Kelly Sheridan Staff Editor, Dark Reading, 2/13/2019
Comment0 comments  |  Read  |  Post a Comment
Scammers Fall in Love with Valentine's Day
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Online dating profiles and social media accounts add to the rich data sources that allow criminals to tailor attacks.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 2/13/2019
Comment0 comments  |  Read  |  Post a Comment
70% of Consumers Want Biometrics in the Workplace
Steve Zurier, Freelance WriterNews
Speed, simplicity, and security underscore their desire, a new study shows.
By Steve Zurier Freelance Writer, 2/13/2019
Comment0 comments  |  Read  |  Post a Comment
Lessons Learned from a Hard-Hitting Security Review
Jaspreet Singh, founder and CEO of DruvaCommentary
Information security is a corporate posture and must be managed at all levels: systems, software, personnel, and all the key processes.
By Jaspreet Singh founder and CEO of Druva, 2/13/2019
Comment0 comments  |  Read  |  Post a Comment
Up to 100,000 Reported Affected in Landmark White Data Breach
Kelly Sheridan, Staff Editor, Dark ReadingNews
Australian property valuation firm Landmark White exposed files containing personal data and property valuation details.
By Kelly Sheridan Staff Editor, Dark Reading, 2/12/2019
Comment1 Comment  |  Read  |  Post a Comment
Microsoft, Adobe Both Close More Than 70 Security Issues
Robert Lemos, Technology Journalist/Data ResearcherNews
With their regularly scheduled Patch Tuesday updates, both companies issued fixes for scores of vulnerabilities in their widely used software.
By Robert Lemos , 2/12/2019
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity and the Human Element: We're All Fallible
Roselle Safran & Utpal Desai, President of Rosint Labs/Director of Product Management of BitdefenderCommentary
We examine the issue of fallibility from six sides: end users, security leaders, security analysts, IT security administrators, programmers, and attackers.
By Roselle Safran & Utpal Desai President of Rosint Labs/Director of Product Management of Bitdefender, 2/12/2019
Comment0 comments  |  Read  |  Post a Comment
'Picnic' Passes Test for Protecting IoT From Quantum Hacks
Dark Reading Staff, Quick Hits
Researchers from DigiCert, Utimaco, and Microsoft Research gives thumbs-up to a new algorithm for implementing quantum hacking-proof digital certificates.
By Dark Reading Staff , 2/12/2019
Comment0 comments  |  Read  |  Post a Comment
Symantec Acquires Luminate to Build on Cloud Security
Dark Reading Staff, Quick Hits
Luminate Security, which specializes in software-defined perimeter technology, will extend Symantec's integrated defense platform.
By Dark Reading Staff , 2/12/2019
Comment0 comments  |  Read  |  Post a Comment
Identifying, Understanding & Combating Insider Threats
Ilan Paretsky, Chief Marketing Officer of EricomCommentary
Your organization is almost certainly on the lookout for threats from outside the company. But are you ready to address threats from within?
By Ilan Paretsky Chief Marketing Officer of Ericom, 2/12/2019
Comment0 comments  |  Read  |  Post a Comment
Experian: US Suffers the Most Online Fraud
Jai Vijayan, Freelance writerNews
New data from the credit reporting firm shows the sheer scale of online activity in the US also has made businesses and consumers there prime targets.
By Jai Vijayan Freelance writer, 2/11/2019
Comment0 comments  |  Read  |  Post a Comment
New Encryption Mode Brings Sincerity and Discretion to Low-Cost Android Devices
Dark Reading Staff, Quick Hits
Adantium, developed by Google, brings communication encryption to bear on storage security.
By Dark Reading Staff , 2/11/2019
Comment0 comments  |  Read  |  Post a Comment
OkCupid Denies Data Breach Amid Account Hack Complaints
Dark Reading Staff, Quick Hits
Users on the dating website report hackers breaking into their accounts, changing email addresses, and resetting passwords.
By Dark Reading Staff , 2/11/2019
Comment0 comments  |  Read  |  Post a Comment
Security Pros Agree Military Should Conduct Offensive Hacking
Dark Reading Staff, Quick Hits
But it can't operate in a bubble, a new Washington Post study indicates.
By Dark Reading Staff , 2/11/2019
Comment3 comments  |  Read  |  Post a Comment
A Dog's Life: Dark Reading Caption Contest Winners
Marilyn Cohodas, Managing Editor, Dark ReadingCommentary
What do a telephony protocol, butt-sniffing, and multifactor authentication have in common? A John Klossner cartoon! And the winners are ...
By Marilyn Cohodas Managing Editor, Dark Reading, 2/8/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Devastating Cyberattack on Email Provider Destroys 18 Years of Data
Jai Vijayan, Freelance writer,  2/12/2019
Up to 100,000 Reported Affected in Landmark White Data Breach
Kelly Sheridan, Staff Editor, Dark Reading,  2/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8354
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.
CVE-2019-8355
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.
CVE-2019-8356
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.
CVE-2019-8357
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.
CVE-2013-2516
PUBLISHED: 2019-02-15
Vulnerability in FileUtils v0.7, Ruby Gem Fileutils <= v0.7 Command Injection vulnerability in user supplied url variable that is passed to the shell.