Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

News & Commentary
Data Center Provider CyrusOne Confirms Ransomware Attack
Dark Reading Staff, Quick Hits
The attack struck CyrusOne's managed services division and compromised six customers primarily serviced by a New York data center.
By Dark Reading Staff , 12/6/2019
Comment0 comments  |  Read  |  Post a Comment
VPN Flaw Allows Criminal Access to Everything on Victims' Computers
Dark Reading Staff, Quick Hits
Vulnerability in the Aviatrix VPN client, since patched, gives an attacker unlimited access to a breached system.
By Dark Reading Staff , 12/5/2019
Comment0 comments  |  Read  |  Post a Comment
Microsoft Defender ATP Brings EDR Capabilities to macOS
Dark Reading Staff, Quick Hits
Mac computers will now have the option to use Microsoft Defender Advanced Threat Protection's endpoint and detection response.
By Dark Reading Staff , 12/5/2019
Comment0 comments  |  Read  |  Post a Comment
(Literally) Put a Ring on It: Protecting Biometric Fingerprints
Dark Reading Staff, Quick Hits
Kaspersky creates a prototype ring you can wear on your finger for authentication.
By Dark Reading Staff , 12/4/2019
Comment0 comments  |  Read  |  Post a Comment
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, OktaCommentary
Underestimating the security changes that need to accompany a shift to the cloud could be fatal to a business. Here's why.
By Diya Jolly Chief Product Officer, Okta, 12/4/2019
Comment1 Comment  |  Read  |  Post a Comment
Microsoft Issues Advisory for Windows Hello for Business
Kelly Sheridan, Staff Editor, Dark ReadingQuick Hits
An issue exists in Windows Hello for Business when public keys persist after a device is removed from Active Directory, if the AD exists, Microsoft reports.
By Kelly Sheridan Staff Editor, Dark Reading, 12/4/2019
Comment0 comments  |  Read  |  Post a Comment
TrickBot Expands in Japan Ahead of the Holidays
Kelly Sheridan, Staff Editor, Dark ReadingNews
Data indicates TrickBot operators are modifying its modules and launching widespread campaigns around the world.
By Kelly Sheridan Staff Editor, Dark Reading, 12/3/2019
Comment0 comments  |  Read  |  Post a Comment
Smith & Wesson Is Magecart's Latest Target
Dark Reading Staff, Quick Hits
Researchers estimate the gun manufacturer's website was compromised sometime before Black Friday.
By Dark Reading Staff , 12/3/2019
Comment0 comments  |  Read  |  Post a Comment
New Free Emulator Challenges Apple's Control of iOS
Robert Lemos, Contributing WriterNews
An open-source tool gives researchers and jailbreakers a free option for researching vulnerabilities in the operating system and gives Apple a new headache.
By Robert Lemos Contributing Writer, 11/27/2019
Comment0 comments  |  Read  |  Post a Comment
How to Get Prepared for Privacy Legislation
Tony Anscombe, Global Security Evangelist & Industry Partnership Ambassador at ESETCommentary
All the various pieces of legislation, both in the US and worldwide, can feel overwhelming. But getting privacy basics right is a solid foundation.
By Tony Anscombe Global Security Evangelist & Industry Partnership Ambassador at ESET, 11/27/2019
Comment9 comments  |  Read  |  Post a Comment
7 Ways to Hang Up on Voice Fraud
Steve Zurier, Contributing Writer
Criminals are coming at us from all direction, including our phones. Don't answer that next call without reading this tips first.
By Steve Zurier Contributing Writer, 11/27/2019
Comment8 comments  |  Read  |  Post a Comment
The Implications of Last Week's Exposure of 1.2B Records
Kelly Sheridan, Staff Editor, Dark ReadingNews
Large sums of organized data, whether public or private, are worth their weight in gold to cybercriminals.
By Kelly Sheridan Staff Editor, Dark Reading, 11/26/2019
Comment0 comments  |  Read  |  Post a Comment
NYPD Pulls Fingerprint Database Offline Due to Ransomware Scare
Dark Reading Staff, Quick Hits
An infected minicomputer distributed an unidentified threat to 23 machines connected to the LiveScan fingerprint tracking system.
By Dark Reading Staff , 11/26/2019
Comment0 comments  |  Read  |  Post a Comment
Tushu, Take Twoshu: Malicious SDK Reappears in Google Play
Kelly Sheridan, Staff Editor, Dark ReadingNews
Months after the Tushu SDK was found infecting Android apps on Google Play, its operators are back with new evasive techniques.
By Kelly Sheridan Staff Editor, Dark Reading, 11/25/2019
Comment0 comments  |  Read  |  Post a Comment
Time to Warn Users About Black Friday & Cyber Monday Scams
Michael Landewe, Chief Privacy Officer at AvananCommentary
Warn your employees to avoid the inevitable scams associated with these two "holidays," or you risk compromising your company's network.
By Michael Landewe Chief Privacy Officer at Avanan, 11/25/2019
Comment0 comments  |  Read  |  Post a Comment
Researchers Explore How Mental Health Is Tracked Online
Kelly Sheridan, Staff Editor, Dark ReadingNews
An analysis of popular mental health-related websites revealed a vast number of trackers, many of which are used for targeted advertising.
By Kelly Sheridan Staff Editor, Dark Reading, 11/22/2019
Comment0 comments  |  Read  |  Post a Comment
Black Hat Europe Q&A: Unveiling the Underground World of Anti-Cheats
Black Hat Staff,  News
Security consultant Joel Noguera describes how he got involved in testing anti-cheat software security, and what to expect from his upcoming Black Hat Europe talk.
By Alex Wawro, Special to Dark Reading , 11/22/2019
Comment0 comments  |  Read  |  Post a Comment
Anatomy of a BEC Scam
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
A look at the characteristics of real-world business email compromise attacks and what makes them tick.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/21/2019
Comment1 Comment  |  Read  |  Post a Comment
Google Cloud Update Gives Users Greater Data Control
Dark Reading Staff, Quick Hits
External Key Manager and Key Access Justification are intended to give organizations greater visibility into requests for data access.
By Dark Reading Staff , 11/20/2019
Comment0 comments  |  Read  |  Post a Comment
Employee Privacy in a Mobile Workplace
Michael J. Covington, Vice President of Product Strategy at WanderaCommentary
Why businesses need guidelines for managing their employees' personal information -- without compromising on security.
By Michael J. Covington Vice President of Product Strategy at Wandera, 11/20/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16772
PUBLISHED: 2019-12-07
The serialize-to-js NPM package before version 3.0.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.to...
CVE-2019-9464
PUBLISHED: 2019-12-06
In various functions of RecentLocationApps.java, DevicePolicyManagerService.java, and RecognitionService.java, there is an incorrect warning indicating an app accessed the user's location. This could dissolve the trust in the platform's permission system, with no additional execution privileges need...
CVE-2019-2220
PUBLISHED: 2019-12-06
In checkOperation of AppOpsService.java, there is a possible bypass of user interaction requirements due to mishandling application suspend. This could lead to local information disclosure no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVers...
CVE-2019-2221
PUBLISHED: 2019-12-06
In hasActivityInVisibleTask of WindowProcessController.java there�s a possible bypass of user interaction requirements due to incorrect handling of top activities in INITIALIZING state. This could lead to local escalation of privilege with no additional execution privileges need...
CVE-2019-2222
PUBLISHED: 2019-12-06
n ihevcd_parse_slice_data of ihevcd_parse_slice.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android...