Loading...


Internet Security Directory
Dark Reading: Risk

-

Dark Reading: Stuxnet Five Years Later: Did We Learn The Right Lesson?

Votes:26 Comments:0
No! That's despite an abundance of best practices and standards that are shining light into the dark corners of industrial control system security. 4/2/2015 By Andrew Ginter The 5th anniversary READ MORE
http://www.darkreading.com/risk/stuxnet-five-years-later-did-we-learn-...

Dark Reading: How A Little Obscurity Can Bolster Security

Votes:7 Comments:0
Most security professionals deride the idea of "security by obscurity." Is it time to re-evaluate the conventional wisdom? 4/17/2014 by Corey Nachreiner One of the first maxims I remember learn READ MORE
http://www.darkreading.com/risk/how-a-little-obscurity-can-bolster-sec...

Dark Reading: A New Framework For Detecting Advanced Rootkits

Votes:24 Comments:0
Last week the security community gained another way to help secure endpoints as researchers released a new framework meant to root out rootkits in UEFI By Ericka Chickowski August 09, 2013 A pa READ MORE
http://www.darkreading.com/risk/a-new-framework-for-detecting-advanced...

Dark Reading: 10 Web-Based Attacks Targeting Your End Users

Votes:18 Comments:0
Cyber criminals often go after your enterprise data by preying on your end users. Here are ten of the most current exploits to watch for By Ericka Chickowski August 07, 2013 With so much of tod READ MORE
http://www.darkreading.com/risk/10-web-based-attacks-targeting-your-en...

Dark Reading: What Every End User Should Know About Online Security

Votes:17 Comments:0
What your end users don't know about security could hurt your business. Here are some tips that may help By Michael Cobb July 18, 2013 [Excerpted from "What Every End User Should Know About Onl READ MORE
http://www.darkreading.com/risk/what-every-end-user-should-know-about-...

Dark Reading: Browser Plug-In Vulns The Endpoint's Weakest Link

Votes:34 Comments:0
Online infections, exploit kit damage wreaked due to poor browser plug-in hygiene By Ericka Chickowski July 12, 2013 Despite all of the attention given to zero-day attacks and system vulnerabil READ MORE
http://www.darkreading.com/risk/browser-plug-in-vulns-the-endpoints-we...

Dark Reading: Study: Nation-States Are Primary Drivers Behind APTs

Votes:19 Comments:0
Most enterprises still ineffective in defending themselves from sophisticated attacks, Fortinet report says By Tim Wilson July 07, 2013 Advanced persistent threats are generally created by nati READ MORE
http://www.darkreading.com/study-nation-states-are-primary-drivers-beh...

Dark Reading: 12 Endpoint Security Myths Dispelled

Votes:7 Comments:0
Mistaken beliefs that hold back endpoint protection By Ericka Chickowski June 11, 2013 It has been years since the security pundits have taken up the mantle to dispel the myth that antivirus al READ MORE
http://www.darkreading.com/risk/12-endpoint-security-myths-dispelled/d...

Dark Reading: Study: Application Vulnerabilities Are No. 1 Threat

Votes:10 Comments:0
Shortage of training among developers is a key cause of high vulnerability rates, (ISC)2 survey says By Tim Wilson May 16, 2013 Application vulnerabilities are the top concern of security profe READ MORE
http://www.darkreading.com/risk/study-application-vulnerabilities-are-...

Dark Reading: Is Application Sandboxing The Next Endpoint Security Must-Have?

Votes:10 Comments:0
Virtualized containers expected to catch on in the enterprise, but the technology has its weaknesses, too By Ericka Chickowski May 14, 2013 With the onslaught of zero-day attacks continuing to READ MORE
http://www.darkreading.com/risk/is-application-sandboxing-the-next-end...

Dark Reading: The Dragon In The Room

Votes:16 Comments:0
China, China, China By Kelly Jackson Higgins May 10, 2013 Everybody's talking China now. The federal government isn't mincing words anymore, either. No more worst-kept secret that Chinese cyber READ MORE
http://www.darkreading.com/risk/the-dragon-in-the-room/d/d-id/1139725

Dark Reading: Consumer Reports: 58 Million U.S. PCs Infected With Malware

Votes:16 Comments:0
Malware cost consumers nearly $4 billion in repairs in 2012, Consumer Reports says By Tim Wilson May 02, 2013 The recently released Consumer Reports' Annual State of the Net Report states that READ MORE
http://www.darkreading.com/risk/consumer-reports-58-million-us-pcs-inf...

Dark Reading: How Attackers Choose Which Vulnerabilities To Exploit

Votes:4 Comments:0
A look at how the bad guys choose their attack methods -- and what you can do about it Michael Cobb April 04, 2013 [Excerpted from "How Attackers Choose Which Vulnerabilities To Exploit," a new READ MORE
http://www.darkreading.com/risk/how-attackers-choose-which-vulnerabili...

Dark Reading: The Truth About Spam

Votes:14 Comments:0
New study shows one in three spam emails contains malware-ridden attachments, and one-fourth of all bots are in enterprise networks Apr 11, 2013 By Kelly Jackson Higgins Another reason not to READ MORE
http://www.darkreading.com/risk/the-truth-about-spam/d/d-id/1139525

Dark Reading: What Antivirus Shortcomings Mean For SMBs

Votes:28 Comments:0
Accepting the risks that come with relying solely on AV not only puts data at risk, but also could kill future earning potential Jan 23, 2013 By Ericka Chickowski As criminals continue to hone READ MORE
http://www.darkreading.com/risk/what-antivirus-shortcomings-mean-for-s...

Dark Reading: Flame: Reading Between The Ones And Zeros

Votes:34 Comments:0
As more information about Flame is revealed, let's consider what we might infer from Flame's composition Jun 23, 2012 By Tom Parker Earlier this month, the news wires were ablaze with news of t READ MORE
http://www.darkreading.com/risk/flame-reading-between-the-ones-and-zer...

Dark Reading: Tech Insight: 5 Myths Of Software Security

Votes:25 Comments:0
Why do vulnerabilities keep cropping up in software? Here are five reasons -- and what developers can do about them Dec 07, 2012 By Jason Sachowski, Contributing Writer (ISC)2 Executive Writers READ MORE
http://www.darkreading.com/risk/tech-insight-5-myths-of-software-secur...

Dark Reading: Busted In 60 Seconds: Malware Reveals Itself In First Minute

Votes:33 Comments:0
Nearly half of all malicious programs attempt to communicate out to the Internet in the first minute. Companies need to listen more closely to their networks Apr 27, 2012 By Robert Lemos There READ MORE
http://www.darkreading.com/risk/busted-in-60-seconds-malware-reveals-i...

Dark Reading: 5 Tips: How To Prevent Botnet Infection

Votes:19 Comments:0
The eleven research team explains how users can protect themselves Sep 25, 2012 Berlin, September 25, 2012 - The Research Team at eleven, leading German e-mail security provider, published five READ MORE
http://www.darkreading.com/risk/5-tips-how-to-prevent-botnet-infection...

Dark Reading: New Microsoft Data Puts Zero-Day Threat Into Perspective

Votes:12 Comments:0
Report on infected Windows machines worldwide also highlights slack patching practices Oct 12, 2011 By Kelly Jackson Higgins First, the good news from Microsoft's newest data on real-world Wind READ MORE
http://www.darkreading.com/risk/new-microsoft-data-puts-zero-day-threa...

Dark Reading: Malware Writers Making Code Tougher To Decode, Harder To Find

Votes:15 Comments:0
Malicious code is more frequently scrambled, encrypted to foil would-be reverse engineers Apr 13, 2011 By Robert Lemos Decoding the methods in malicious code is becoming more difficult, accordi READ MORE
http://www.darkreading.com/risk/malware-writers-making-code-tougher-to...

Dark Reading: Web Browsers, Desktop Software Top "Dirty Dozen" Apps List

Votes:4 Comments:0
Google Chrome placed first on Bit9's list Nov 16, 2010 Bit9, Inc. today unveiled its fourth annual report of the top applications with reported security vulnerabilities in 2010. Google Chrome pl READ MORE
http://www.darkreading.com/risk/web-browsers-desktop-software-top-and-...

Dark Reading: Drive-By Downloads: Malware's Most Popular Distribution Method

Votes:24 Comments:0
After years of burying malicious software in email and portable storage media, attackers now favor quick downloads via legitimate websites, researcher says Nov 12, 2010 By Tim Wilson Why try to READ MORE
http://www.darkreading.com/risk/drive-by-downloads-malwares-most-popul...

Dark Reading: Bots Hard To Kill -- Even When Botnets Get Decapitated

Votes:32 Comments:0
Despite the wave of major takedowns this past year, botnets are still thriving with a seemingly endless supply of bots available to feed the beast Oct 15, 2010 By Kelly Jackson Higgins When the READ MORE
http://www.darkreading.com/risk/bots-hard-to-kill----even-when-botnets...

Dark Reading: You're Always Just Two Clicks Away From Malware

Votes:9 Comments:0
New study shows correlation between top 1,000 visited websites and proximity to malware Sep 28, 2010 By Kelly Jackson Higgins A new study has found that users visiting the top 1,000 websites ar READ MORE
http://www.darkreading.com/risk/youre-always-just-two-clicks-away-from...

Dark Reading: Google Report: How Web Attackers Evade Malware Detection

Votes:28 Comments:0
Data gathered from Google's Safe Browsing API service reveals drive-by infections most common, with 'IP cloaking' on the rise Aug 18, 2011 By Kelly Jackson Higgins Attackers increasingly are en READ MORE
http://www.darkreading.com/risk/google-report-how-web-attackers-evade-...

Dark Reading: Most Websites Vulnerable To Attack, WhiteHat Study Says

Votes:15 Comments:0
Average site is exposed about 270 days of the year, according to report Mar 08, 2011 By Tim Wilson The average website has serious vulnerabilities more than nine months of the year, according t READ MORE
http://www.darkreading.com/risk/most-websites-vulnerable-to-attack-whi...

Dark Reading: Websites Are Attacked Once Every Two Minutes

Votes:15 Comments:0
New study show directory traversal, XSS most common attacks, not SQL injection Jul 25, 2011 By Kelly Jackson Higgins Websites today get attacked an average of once every two minutes, and upward READ MORE
http://www.darkreading.com/risk/websites-are-attacked-once-every-two-m...

Dark Reading: Microsoft: Conficker Worm Remains 'Ongoing' Threat

Votes:23 Comments:0
Three-year-old 'dead' Windows worm infection is still spreading -- mainly via weak or stolen passwords, new Microsoft report says Apr 25, 2012 By Kelly Jackson Higgins The orphaned botnet worm READ MORE
http://www.darkreading.com/risk/microsoft-conficker-worm-remains-ongoi...
Dark Reading risk articles
Internet Marketing in Missouri , Internet Marketing in Tennessee
-
Search
Search
Search
Search
Login
Privacy Policy