Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

News & Commentary
Apple's New Bounty Program Has Huge Incentives, Big Risks
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Industry observers applaud the program's ability to find exploits but fear unintended consequences.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/13/2019
Comment0 comments  |  Read  |  Post a Comment
More Focus on Security as Payment Technologies Proliferate
Robert Lemos, Contributing WriterNews
Banks and merchants are expanding their payment offerings but continue to be wary of the potential fraud risk.
By Robert Lemos Contributing Writer, 8/12/2019
Comment0 comments  |  Read  |  Post a Comment
Dark Reading News Desk Live at Black Hat USA 2019
Sara Peters, Senior Editor at Dark ReadingNews
Watch right here for 40 video interviews with speakers and sponsors. Streaming live from Black Hat USA Wednesday and Thursday 2 p.m. to 6 p.m. Eastern.
By Sara Peters Senior Editor at Dark Reading, 8/8/2019
Comment1 Comment  |  Read  |  Post a Comment
Researchers Show Vulnerabilities in Facial Recognition
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The algorithms that check for a user's 'liveness' have blind spots that can lead to vulnerabilities.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/7/2019
Comment1 Comment  |  Read  |  Post a Comment
Fighting Back Against Mobile Fraudsters
DJ Murphy, Editor-in-Chief, Security Portfolio, at Reed ExhibitionsCommentary
The first step toward identifying and preventing mobile fraud threats is acknowledging that mobile security requires a unique solution.
By DJ Murphy Editor-in-Chief, Security Portfolio, at Reed Exhibitions, 8/5/2019
Comment0 comments  |  Read  |  Post a Comment
47% of Android Anti-Malware Apps Are Flawed
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Protection failures come at a time when malicious Android software is becoming more of a problem.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/1/2019
Comment0 comments  |  Read  |  Post a Comment
Demystifying New FIDO Standards & Innovations
Bojan Simic, Chief Technology Officer & Co-Founder of HYPRCommentary
Staying on top of the latest cybersecurity risks and preferred attack methods can feel impossible, but standards like FIDO2 are designed to help relieve the burden.
By Bojan Simic Chief Technology Officer & Co-Founder of HYPR, 8/1/2019
Comment0 comments  |  Read  |  Post a Comment
Apple Device Management Firm Jamf Acquires Digita Security
Dark Reading Staff, Quick Hits
Digita Security's Apple Mac endpoint protection solutions will join Jamf's MDM suite for iOS and MacOS.
By Dark Reading Staff , 7/31/2019
Comment0 comments  |  Read  |  Post a Comment
8 Free Tools to Be Showcased at Black Hat and DEF CON
Ericka Chickowski, Contributing Writer
Expect a full slate of enterprise-class open source tools to take the spotlight when security researchers share their bounties with the community at large.
By Ericka Chickowski Contributing Writer, 7/31/2019
Comment0 comments  |  Read  |  Post a Comment
Apple iOS Flaw Could Give Attacker Access via iMessage
Dark Reading Staff, Quick Hits
Google Project Zero researchers found an iOS vulnerability that could let an attacker snoop on a victim's phone remotely.
By Dark Reading Staff , 7/30/2019
Comment0 comments  |  Read  |  Post a Comment
CISOs Must Evolve to a Data-First Security Program
Michael Coates, CEO & Co-Founder of Altitude NetworksCommentary
Such a program will require effort and reprioritization, but it will let your company fight modern-day threats and protect your most important assets.
By Michael Coates CEO & Co-Founder of Altitude Networks, 7/30/2019
Comment2 comments  |  Read  |  Post a Comment
9 Things That Don't Worry You Today (But Should)
Curtis Franklin Jr., Senior Editor at Dark Reading
There are security concerns that go far beyond the usual suspects. Here are some that should be on your list of scary things.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/29/2019
Comment1 Comment  |  Read  |  Post a Comment
Android Spyware Has Ties to Election Interference
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Recently revealed surveillance-ware comes from a consultant with close ties to Russia's GRU who was sanctioned by the US for election-tampering.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/25/2019
Comment1 Comment  |  Read  |  Post a Comment
Android Malware 'Triada' Most Active on Telco Networks
Jai Vijayan, Contributing WriterNews
Google in May disclosed that several Android devices had been shipped pre-installed with the RAT.
By Jai Vijayan Contributing Writer, 7/25/2019
Comment0 comments  |  Read  |  Post a Comment
CISA Warns Public About the Risks of 5G
Dark Reading Staff, Quick Hits
Vulnerabilities include everything from physical risks through the supply chain to business risks.
By Dark Reading Staff , 7/23/2019
Comment0 comments  |  Read  |  Post a Comment
Europol Head Fears 5G Will Give Criminals an Edge
Dark Reading Staff, Quick Hits
Catherine De Bolle is concerned law enforcement will lose its ability to track criminals with the arrival of 5G networks.
By Dark Reading Staff , 7/19/2019
Comment1 Comment  |  Read  |  Post a Comment
Security Considerations in a BYOD Culture
Kacy Zurkus, Contributing Writer
The 'bring your own device' movement has put security pros on high alert for a new breed of predator who is on the hunt to find ways to exploit the ever-expanding attack surface.
By Kacy Zurkus Contributing Writer, 7/19/2019
Comment0 comments  |  Read  |  Post a Comment
Sprint Reveals Account Breach via Samsung Website
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The last-June breach exposed data including names, phone numbers, and account numbers.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/17/2019
Comment1 Comment  |  Read  |  Post a Comment
Security Snapshot: OS, Authentication, Browser & Cloud Trends
Kelly Sheridan, Staff Editor, Dark ReadingNews
New research shows cloud apps are climbing, SMS authentication is falling, Chrome is the enterprise browser favorite, and Android leads outdated devices.
By Kelly Sheridan Staff Editor, Dark Reading, 7/16/2019
Comment0 comments  |  Read  |  Post a Comment
Flaws in Telegram & WhatsApp on Android Put Data at Risk
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
App settings combined with Android behavior can put data integrity at risk for WhatsApp and Telegram users.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/15/2019
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by allenred
Current Conversations nice post
In reply to: cyber security
Post Your Own Reply
More Conversations
PR Newswire
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15160
PUBLISHED: 2019-08-19
The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD.
CVE-2019-15150
PUBLISHED: 2019-08-19
In the OAuth2 Client extension before 0.4 for MediaWiki, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function.
CVE-2017-18550
PUBLISHED: 2019-08-19
An issue was discovered in drivers/scsi/aacraid/commctrl.c in the Linux kernel before 4.13. There is potential exposure of kernel stack memory because aac_get_hba_info does not initialize the hbainfo structure.
CVE-2017-18551
PUBLISHED: 2019-08-19
An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.
CVE-2017-18552
PUBLISHED: 2019-08-19
An issue was discovered in net/rds/af_rds.c in the Linux kernel before 4.11. There is an out of bounds write and read in the function rds_recv_track_latency.