Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
News & Commentary
Raspberry Pi Used in JPL Breach
Dark Reading Staff, Quick Hits
NASA report shows exfiltration totaling more than 100 GB of information since 2009.
By Dark Reading Staff , 6/24/2019
Comment0 comments  |  Read  |  Post a Comment
7 2019 Security Venture Fund Deals You Should Know
Curtis Franklin Jr., Senior Editor at Dark Reading
2019 has, so far, been a busy year for venture capitalists in the security industry. Here are 7 funding rounds important because of the technologies or market trends they represent.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/20/2019
Comment0 comments  |  Read  |  Post a Comment
Insecure Home IoT Devices a Clear and Present Danger to Corporate Security
Jai Vijayan, Contributing WriterNews
Avast-sponsored study shows wide prevalence of IoT devices, many with weak credentials and other security vulnerabilities.
By Jai Vijayan Contributing Writer, 6/19/2019
Comment3 comments  |  Read  |  Post a Comment
Power Outage Hits Millions in South America
Dark Reading Staff, Quick Hits
The outage, which is not (so far) seen as the result of a cyberattack, still had a significant impact on network and server availability.
By Dark Reading Staff , 6/17/2019
Comment0 comments  |  Read  |  Post a Comment
Cyberattack Hits Aircraft Parts Manufacturer
Dark Reading Staff, Quick Hits
Belgium's Asco has shut down manufacturing around the world, including the US, in response to a major cybersecurity event, but what happened isn't clear.
By Dark Reading Staff , 6/13/2019
Comment0 comments  |  Read  |  Post a Comment
Cisco Buys Sentryo
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Cisco is adding the French company's network visibility products to its IoT network lineup.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/6/2019
Comment0 comments  |  Read  |  Post a Comment
How to Get the Most Benefits from Biometrics
Bojan Simic, Chief Technology Officer & Co-Founder of HYPRCommentary
Providing an easy-to-use, uniform authentication experience without passwords is simpler than you may think.
By Bojan Simic Chief Technology Officer & Co-Founder of HYPR, 6/5/2019
Comment2 comments  |  Read  |  Post a Comment
Focusing on Endpoints: 5 Steps to Fight Cybercrime
Matthew Lewinski, Distinguished Engineer at Quest SoftwareCommentary
Follow these best practices to strengthen endpoint management strategies and protect company data.
By Matthew Lewinski Distinguished Engineer at Quest Software, 5/31/2019
Comment3 comments  |  Read  |  Post a Comment
7 Recent Wins Against Cybercrime
Jai Vijayan, Contributing Writer
The increasing number of successful law enforcement actions and prosecutions suggest that cybercriminals have plenty of reason to be looking over their shoulders.
By Jai Vijayan Contributing Writer, 5/24/2019
Comment0 comments  |  Read  |  Post a Comment
To Manage Security Risk, Manage Data First
Kelly Sheridan, Staff Editor, Dark ReadingNews
At Interop 2019, IT and security experts urged attendees to focus on data asset management as a means of mitigating risk.
By Kelly Sheridan Staff Editor, Dark Reading, 5/23/2019
Comment1 Comment  |  Read  |  Post a Comment
Consumer IoT Devices Are Compromising Enterprise Networks
Ericka Chickowski, Contributing WriterNews
While IoT devices continue to multiply, the latest studies show a dangerous lack of visibility into those connected to enterprise networks.
By Ericka Chickowski Contributing Writer, 5/22/2019
Comment0 comments  |  Read  |  Post a Comment
DHS Warns of Data Theft via Chinese-Made Drones
Dark Reading Staff, Quick Hits
The drones are reportedly built with parts that can compromise organizations' data and share it on a server accessible to the Chinese government.
By Dark Reading Staff , 5/20/2019
Comment0 comments  |  Read  |  Post a Comment
When Older Windows Systems Won't Die
Kelly Sheridan, Staff Editor, Dark ReadingNews
Microsoft's decision to patch unsupported machines for the critical CVE-2019-0708 flaw is a reminder that XP, 2003, and other older versions of Windows still run in some enterprises.
By Kelly Sheridan Staff Editor, Dark Reading, 5/17/2019
Comment0 comments  |  Read  |  Post a Comment
Introducing the Digital Transformation Architect
Jordan Blake, VP of Products at BehavioSecCommentary
Bet-the-company transformation that expands the attack surface requires close alignment and leadership across executive, IT and security teams.
By Jordan Blake VP of Products at BehavioSec, 5/15/2019
Comment0 comments  |  Read  |  Post a Comment
Sectigo Buys Icon Labs to Expand IoT Security Platform
Dark Reading Staff, Quick Hits
End-to-end IoT security product aims to give manufacturers, systems integrators, and businesses a means to harden device security.
By Dark Reading Staff , 5/9/2019
Comment0 comments  |  Read  |  Post a Comment
Security Depends on Careful Design
Susanto Irwan, Co-Founder and VP of Engineering at Xage SecurityCommentary
Deploying focused edge protection on-site extends security beyond the network level to shield millions of previously exposed devices, apps, and control systems.
By Susanto Irwan Co-Founder and VP of Engineering at Xage Security, 5/2/2019
Comment0 comments  |  Read  |  Post a Comment
Peer-to-Peer Vulnerability Exposes Millions of IoT Devices
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
A flaw in the software used to remotely access cameras and monitoring devices could allow hackers to easily take control of millions of pieces of the IoT.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/29/2019
Comment0 comments  |  Read  |  Post a Comment
Malware Makes Itself at Home in Set-Top Boxes
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Low-cost boxes that promise free TV streaming services often come complete with malware, according to a new study.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/26/2019
Comment0 comments  |  Read  |  Post a Comment
Go Medieval to Keep OT Safe
Ilan Abadi, VP and Global CISO, Teva Pharmaceutical IndustriesCommentary
When it comes to operational technology and industrial control systems, make sure you're the lord of all you survey.
By Ilan Abadi VP and Global CISO, Teva Pharmaceutical Industries, 4/26/2019
Comment1 Comment  |  Read  |  Post a Comment
Regulations, Insider Threat Handicap Healthcare IT Security
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Healthcare IoT is expanding opportunities for hackers as the sector struggles to keep up security-wise.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/25/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Florida Town Pays $600K to Ransomware Operators
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/20/2019
Pledges to Not Pay Ransomware Hit Reality
Robert Lemos, Contributing Writer,  6/21/2019
AWS CISO Talks Risk Reduction, Development, Recruitment
Kelly Sheridan, Staff Editor, Dark Reading,  6/25/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10164
PUBLISHED: 2019-06-26
PostgreSQL versions 10.x before 10.9 and versions 11.x before 11.4 are vulnerable to a stack-based buffer overflow. Any authenticated user can overflow a stack-based buffer by changing the user's own password to a purpose-crafted value. This often suffices to execute arbitrary code as the PostgreSQL...
CVE-2019-11583
PUBLISHED: 2019-06-26
The issue searching component in Jira before version 8.1.0 allows remote attackers to deny access to Jira service via denial of service vulnerability in issue search when ordering by "Epic Name".
CVE-2019-4234
PUBLISHED: 2019-06-26
IBM PureApplication System 2.2.3.0 through 2.2.5.3 weakness in the implementation of locking feature in pattern editor. An attacker by intercepting the subsequent requests can bypass business logic to modify the pattern to unlocked state. IBM X-Force ID: 159416.
CVE-2019-4235
PUBLISHED: 2019-06-26
IBM PureApplication System 2.2.3.0 through 2.2.5.3 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 159417.
CVE-2019-4241
PUBLISHED: 2019-06-26
IBM PureApplication System 2.2.3.0 through 2.2.5.3 could allow an authenticated user with local access to bypass authentication and obtain administrative access. IBM X-Force ID: 159467.