Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


News & Commentary
Android App Analysis Uncovers Seasonal Shopping Risk
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers scanned 4,200 Android apps and found many exhibit malicious behavior or have a dangerous level of permissions.
By Kelly Sheridan Staff Editor, Dark Reading, 12/12/2019
Comment0 comments  |  Read  |  Post a Comment
Younger Generations Drive Bulk of 2FA Adoption
Kelly Sheridan, Staff Editor, Dark ReadingNews
Use of two-factor authentication has nearly doubled in the past two years , pointing to a new wave of acceptance.
By Kelly Sheridan Staff Editor, Dark Reading, 12/11/2019
Comment0 comments  |  Read  |  Post a Comment
What's in a Botnet? Researchers Spy on Geost Operators
Kelly Sheridan, Staff Editor, Dark ReadingNews
The investigation of a major Android banking botnet yields insights about how cybercriminals structure and run an illicit business.
By Kelly Sheridan Staff Editor, Dark Reading, 12/4/2019
Comment1 Comment  |  Read  |  Post a Comment
StrandHogg Vulnerability Affects All Versions of Android
Kelly Sheridan, Staff Editor, Dark ReadingNews
The bug enables malware to pose as any legitimate Android app, letting attackers track messages, photos, credentials, and phone conversations.
By Kelly Sheridan Staff Editor, Dark Reading, 12/2/2019
Comment0 comments  |  Read  |  Post a Comment
New Free Emulator Challenges Apple's Control of iOS
Robert Lemos, Contributing WriterNews
An open-source tool gives researchers and jailbreakers a free option for researching vulnerabilities in the operating system and gives Apple a new headache.
By Robert Lemos Contributing Writer, 11/27/2019
Comment0 comments  |  Read  |  Post a Comment
7 Ways to Hang Up on Voice Fraud
Steve Zurier, Contributing Writer
Criminals are coming at us from all direction, including our phones. Don't answer that next call without reading this tips first.
By Steve Zurier Contributing Writer, 11/27/2019
Comment8 comments  |  Read  |  Post a Comment
Tushu, Take Twoshu: Malicious SDK Reappears in Google Play
Kelly Sheridan, Staff Editor, Dark ReadingNews
Months after the Tushu SDK was found infecting Android apps on Google Play, its operators are back with new evasive techniques.
By Kelly Sheridan Staff Editor, Dark Reading, 11/25/2019
Comment0 comments  |  Read  |  Post a Comment
They See You When You're Shopping: Holiday Cybercrime Starts Early
Dark Reading Staff, Quick Hits
Researchers notice year-end phishing attacks starting in July and ramping up in September.
By Dark Reading Staff , 11/25/2019
Comment1 Comment  |  Read  |  Post a Comment
Google Increases Top Android Hacking Prize to $1M
Dark Reading Staff, Quick Hits
Google expands its Android Security Rewards program and multiplies its top cash prize from $200,000 to $1 million.
By Dark Reading Staff , 11/21/2019
Comment0 comments  |  Read  |  Post a Comment
Employee Privacy in a Mobile Workplace
Michael J. Covington, Vice President of Product Strategy at WanderaCommentary
Why businesses need guidelines for managing their employees' personal information -- without compromising on security.
By Michael J. Covington Vice President of Product Strategy at Wandera, 11/20/2019
Comment0 comments  |  Read  |  Post a Comment
Vulnerability Could Give Criminals Camera Control on Millions of Android Smartphones
Dark Reading Staff, Quick Hits
Unauthorized activities could be triggered even if a phone is locked, its screen is turned off, or a person is in the middle of a call.
By Dark Reading Staff , 11/20/2019
Comment0 comments  |  Read  |  Post a Comment
Facebook Discloses WhatsApp MP4 Video Vulnerability
Dark Reading Staff, Quick Hits
A stack-based buffer overflow bug can be exploited by sending a specially crafted video file to a WhatsApp user.
By Dark Reading Staff , 11/18/2019
Comment0 comments  |  Read  |  Post a Comment
Google Announces App Defense Alliance
Dark Reading Staff, Quick Hits
The industry partnership will scan apps for malware before they're published on the Google Play Store.
By Dark Reading Staff , 11/6/2019
Comment0 comments  |  Read  |  Post a Comment
Google Launches OpenTitan Project to Open Source Chip Security
Kelly Sheridan, Staff Editor, Dark ReadingNews
OpenTitan is an open source collaboration among Google and technology companies to strengthen root-of-trust chip design.
By Kelly Sheridan Staff Editor, Dark Reading, 11/5/2019
Comment0 comments  |  Read  |  Post a Comment
US Lawmakers Fear Chinese-Owned TikTok Poses Security Risk
Dark Reading Staff, Quick Hits
The popular video app has more than 110 million downloads in the United States and could give China access to users' personal data, they say.
By Dark Reading Staff , 10/28/2019
Comment0 comments  |  Read  |  Post a Comment
40% of Security Pros Job Hunting as Satisfaction Drops
Kelly Sheridan, Staff Editor, Dark ReadingNews
Symptoms of job dissatisfaction creep into an industry already plagued with gaps in diversity and work-life balance.
By Kelly Sheridan Staff Editor, Dark Reading, 10/24/2019
Comment8 comments  |  Read  |  Post a Comment
Apple Boots 17 Trojan-Laden Apps From Mobile Store
Jai Vijayan, Contributing WriterNews
Malware was designed to carry out click-fraud, Wandera says.
By Jai Vijayan Contributing Writer, 10/24/2019
Comment0 comments  |  Read  |  Post a Comment
Mobile Users Targeted With Malware, Tracked by Advertisers
Robert Lemos, Contributing WriterNews
Cybercriminals continue to seed app stores with malicious apps, advanced attackers successfully compromise mobile devices, and advertisers continue to track users, new reports show.
By Robert Lemos Contributing Writer, 10/24/2019
Comment0 comments  |  Read  |  Post a Comment
8 Tips for More Secure Mobile Computing
Curtis Franklin Jr., Senior Editor at Dark Reading
Mobile devices are a huge part of enterprise IT. Here's what to advise their users to do to keep their devices and critical business data best protected.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 10/23/2019
Comment0 comments  |  Read  |  Post a Comment
FIDO-Based Authentication Arrives for Smartwatches
Kelly Sheridan, Staff Editor, Dark ReadingNews
The Nok Nok App SDK for Smart Watch is designed to let businesses implement FIDO-based authentication on smartwatches.
By Kelly Sheridan Staff Editor, Dark Reading, 10/22/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by janettjworkman
Current Conversations Thank you somuch
In reply to: Thank you somuch
Post Your Own Reply
More Conversations
PR Newswire
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Lessons from the NSA: Know Your Assets
Robert Lemos, Contributing Writer,  12/12/2019
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...