Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
News & Commentary
Behind the Scenes at ICS Village
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
ICS Village co-founder Bryson Bort reveals plans for research-dedicated events that team independent researchers, critical infrastructure owners, and government specialists.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/16/2019
Comment0 comments  |  Read  |  Post a Comment
Apple's New Bounty Program Has Huge Incentives, Big Risks
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Industry observers applaud the program's ability to find exploits but fear unintended consequences.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/13/2019
Comment0 comments  |  Read  |  Post a Comment
Hackers Can Hurt Victims with Noise
Dark Reading Staff, Quick Hits
Research presented at DEF CON shows that attackers can hijack Wi-Fi and Bluetooth-connected speakers to produce damaging sounds.
By Dark Reading Staff , 8/12/2019
Comment0 comments  |  Read  |  Post a Comment
6 Security Considerations for Wrangling IoT
Prabhuram Mohan, Senior Director of Engineering at WhiteHat SecurityCommentary
The Internet of Things isn't going away, so it's important to be aware of the technology's potential pitfalls.
By Prabhuram Mohan Senior Director of Engineering at WhiteHat Security, 8/12/2019
Comment0 comments  |  Read  |  Post a Comment
Significant Vulnerabilities Found in 6 Common Printer Brands
Robert Lemos, Contributing WriterNews
In a half-year project, two researchers tested six of the top enterprise printer brands and found vulnerabilities in every device, some of which allow remote execution.
By Robert Lemos Contributing Writer, 8/9/2019
Comment0 comments  |  Read  |  Post a Comment
Dark Reading News Desk Live at Black Hat USA 2019
Sara Peters, Senior Editor at Dark ReadingNews
Watch right here for 40 video interviews with speakers and sponsors. Streaming live from Black Hat USA Wednesday and Thursday 2 p.m. to 6 p.m. Eastern.
By Sara Peters Senior Editor at Dark Reading, 8/8/2019
Comment1 Comment  |  Read  |  Post a Comment
Researchers Show Vulnerabilities in Facial Recognition
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The algorithms that check for a user's 'liveness' have blind spots that can lead to vulnerabilities.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/7/2019
Comment1 Comment  |  Read  |  Post a Comment
Boeing 787 On-Board Network Vulnerable to Remote Hacking, Researcher Says
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Boeing disputes IOActive findings ahead of security firm's Black Hat USA presentation.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/7/2019
Comment0 comments  |  Read  |  Post a Comment
US Air Force Bug Bounty Program Nets 54 Flaws for $123,000
Robert Lemos, Contributing WriterNews
The Air Force brought together 50 vetted hackers to find the vulnerabilities in the latest bug-bounty program hosted by a branch of the US military.
By Robert Lemos Contributing Writer, 8/6/2019
Comment1 Comment  |  Read  |  Post a Comment
Russian Attack Group Uses Phones & Printers to Breach Corporate Networks
Dark Reading Staff, Quick Hits
Microsoft spotted Strontium, also known as APT28 or Fancy Bear, using IoT devices to breach businesses and seek high-value data.
By Dark Reading Staff , 8/6/2019
Comment1 Comment  |  Read  |  Post a Comment
US Utilities Hit with Phishing Attack
Dark Reading Staff, Quick Hits
An email phishing attack, thought to be from a nation-state actor, claims that engineers have failed licensing exams.
By Dark Reading Staff , 8/2/2019
Comment0 comments  |  Read  |  Post a Comment
Why the Network Is Central to IoT Security
Jon Green, President & CTO for Security at Aruba Networks, a Hewlett Packard EnterpriseCommentary
Is there something strange about your network activity? Better make sure all of your IoT devices are under control.
By Jon Green President & CTO for Security at Aruba Networks, a Hewlett Packard Enterprise, 7/31/2019
Comment1 Comment  |  Read  |  Post a Comment
Keep Your Eye on Digital Certificates
Terry Sweeney, Contributing Editor
X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.
By Terry Sweeney Contributing Editor, 7/31/2019
Comment1 Comment  |  Read  |  Post a Comment
Insecure Real-Time Video Protocols Allow Hollywood-Style Hacking
Robert Lemos, Contributing WriterNews
Lack of security in the default settings of Internet-enabled video cameras make co-opting video feeds not just a movie-hacker technique, but a reality for millions of cameras.
By Robert Lemos Contributing Writer, 7/30/2019
Comment0 comments  |  Read  |  Post a Comment
Series of Zero-Day Vulnerabilities Could Endanger 200 Million Devices
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Vulnerabilities in VxWorks' TCP stack could allow an attacker to execute random code, launch a DoS attack, or use the vulnerable system to attack other devices.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/29/2019
Comment0 comments  |  Read  |  Post a Comment
Mirai-Like Botnet Wages Massive Application-Layer DDoS Attack
Robert Lemos, Contributing WriterNews
IoT botnetmade up mainly of routershit a service provider with nearly 300,000 requests-per-second in a 13-day deluge of data.
By Robert Lemos Contributing Writer, 7/24/2019
Comment1 Comment  |  Read  |  Post a Comment
CISA Warns Public About the Risks of 5G
Dark Reading Staff, Quick Hits
Vulnerabilities include everything from physical risks through the supply chain to business risks.
By Dark Reading Staff , 7/23/2019
Comment0 comments  |  Read  |  Post a Comment
Mirai Groups Target Business IoT Devices
Robert Lemos, Contributing WriterNews
More than 30% of Mirai attacks, and an increasing number of variants of the malicious malare, are going after enterprise IoT devices, raising the stakes for business.
By Robert Lemos Contributing Writer, 7/19/2019
Comment1 Comment  |  Read  |  Post a Comment
Bluetooth Bug Enables Tracking on Windows 10, iOS & macOS Devices
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers discover a third-party algorithm in multiple high-profile Bluetooth devices exposes users to third-party tracking and data access.
By Kelly Sheridan Staff Editor, Dark Reading, 7/17/2019
Comment1 Comment  |  Read  |  Post a Comment
Industry Insight: Checking Up on Healthcare Security
Kelly Sheridan, Staff Editor, Dark ReadingNews
Modern threats putting healthcare organization at risk, how they're improving their security posture, and where many fall short.
By Kelly Sheridan Staff Editor, Dark Reading, 7/10/2019
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by allenred
Current Conversations nice post
In reply to: cyber security
Post Your Own Reply
Posted by christie446
Current Conversations it very funny
In reply to: woa
Post Your Own Reply
Posted by johnadao
Current Conversations Thank you somuch
In reply to: Thank you somuch
Post Your Own Reply
More Conversations
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15160
PUBLISHED: 2019-08-19
The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD.
CVE-2019-15150
PUBLISHED: 2019-08-19
In the OAuth2 Client extension before 0.4 for MediaWiki, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function.
CVE-2017-18550
PUBLISHED: 2019-08-19
An issue was discovered in drivers/scsi/aacraid/commctrl.c in the Linux kernel before 4.13. There is potential exposure of kernel stack memory because aac_get_hba_info does not initialize the hbainfo structure.
CVE-2017-18551
PUBLISHED: 2019-08-19
An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.
CVE-2017-18552
PUBLISHED: 2019-08-19
An issue was discovered in net/rds/af_rds.c in the Linux kernel before 4.11. There is an out of bounds write and read in the function rds_recv_track_latency.