Loading...
Internet Security Directory
Dark Reading: Vulnerabilities & Threats
-
Internet Security: Articles
Internet Security: Blogs
Internet Security: E-books
Internet Security: Freeware
Internet Security: Media
Internet Security: Organizations
Internet Security: Reviews & Tests
Internet Security: Software
Internet Marketing in New Jersey
Home
Browse
Contribute
Submit
About Us
Contact
/
Home
/
Internet Security: Articles
/
Internet Security: Dark Reading
/Dark Reading: Vulnerabilities & Threats
Dark Reading: Newly Discovered Android Trojan Hijacks Routers
Votes:24
Comments:0
Switcher takes advantage of Android users to infect WiFi routers in 'dangerous new trend.' 1/3/2017 By Jai Vijayan The most common way for threat actors to compromise a network router is to att
READ MORE
http://www.darkreading.com/vulnerabilities---threats/newly-discovered-...
Dark Reading: 'Root' & The New Age Of IoT-Based DDoS Attacks
Votes:4
Comments:0
Last Friday's massive DDoS that exploited online cameras and DVRs was simple to pull off -- and a new chapter in online attacks. 10/24/2016 By Kelly Jackson Higgins The distributed denial-of-se
READ MORE
http://www.darkreading.com/vulnerabilities---threats/root-and-the-new-...
Dark Reading: Password-Stealing Trojan Now Also Attacks With Cerber Ransomware
Votes:29
Comments:0
Weaponized Microsoft Word Documents spread one-two punch via the infamous Betabot. 9/1/2016 By Kelly Jackson Higgins An old-school banking Trojan has been reincarnated as a weaponized document
READ MORE
http://www.darkreading.com/vulnerabilities---threats/-password-stealin...
Dark Reading: An Inside Look At The New Apple Mac Malware 'Eleanor'
Votes:33
Comments:0
Researchers from Bitdefender find security hole that opens up a backdoor to the Mac OS X system. 7/8/2016 Steve Zurier Apple Mac users, take cover: security researchers at Bitdefender recently
READ MORE
http://www.darkreading.com/vulnerabilities---threats/an-inside-look-at...
Dark Reading: Attackers Wrapping New Tools In Old Malware To Target Medical Devi...
Votes:21
Comments:0
Hospital equipment running old operating systems providing safe harbor for data theft, TrapX says. 6/28/2016 By Jai Vijayan Medical devices running outdated operating systems like Windows XP an
READ MORE
http://www.darkreading.com/vulnerabilities---threats/attackers-wrappin...
Dark Reading: Dridex Malware Now Used For Stealing Payment Card Data
Votes:30
Comments:0
An analysis of Dridex infrastructure shows dangerous changes, potentially new operators. 4/8/2016 By Jai Vijayan New analysis of the command and control panel and attack mechanisms of the Dride
READ MORE
http://www.darkreading.com/vulnerabilities---threats/dridex-malware-no...
Dark Reading: Ransomware Will Spike As More Cybercrime Groups Move In
Votes:18
Comments:0
The lure of easy money attracting organized groups is a trend that spells more trouble for enterprises, researchers say. 3/16/2016 By Jai Vijayan Look for a sharp uptick in the quantity and qua
READ MORE
http://www.darkreading.com/vulnerabilities---threats/ransomware-will-s...
Dark Reading: New Trojan Xbot A Swiss-Army Knife Of Malicious Features
Votes:28
Comments:0
Malware can steal banking and card info, encrypt SD cards, intercept messages and more, say researchers at Palo Alto Networks 2/19/2016 By Jai Vijayan The creators of a new Android Trojan dubbe
READ MORE
http://www.darkreading.com/vulnerabilities---threats/new-trojan-xbot-a...
Dark Reading: 'Spymel' Is Latest Example Of Attackers Using Signed Malware
Votes:40
Comments:0
What was once reserved for targeted attacks is being increasingly used to distribute common crimeware payloads says Zscaler. 1/8/2016 By Jai Vijayan In another instance of the growing tendency
READ MORE
http://www.darkreading.com/vulnerabilities---threats/spymel-is-latest-...
Dark Reading: Newly Discovered 'Master' Cyber Espionage Group Trumps Stuxnet
Votes:5
Comments:0
The so-called Equation Group epitomizes the goal of persistence in cyber spying--reprogramming hard drives and hacking other targets such as air-gapped computers--and points to possible US connection.
READ MORE
http://www.darkreading.com/vulnerabilities---threats/advanced-threats/...
Dark Reading: Browsers Are The Window To Enterprise Infection
Votes:24
Comments:0
Ponemon report says infections dominated by browser-based exploits. 2/2/2015 By Ericka Chickowski The enterprise malware problem is largely an enterprise browser insecurity problem, according t
READ MORE
http://www.darkreading.com/browsers-are-the-window-to-enterprise-infec...
Dark Reading: Internet Of Things Security Reaches Tipping Point
Votes:40
Comments:0
Public safety issues bubble to the top in security flaw revelations. 8/13/2014 By Kelly Jackson Higgins It all began more than four years ago with HD Moore's groundbreaking research in embedded
READ MORE
http://www.darkreading.com/vulnerabilities---threats/internet-of-thing...
Dark Reading: How Malware Writers Cheat AV Zero-Day Detection
Votes:17
Comments:0
A researcher reverse engineers AVG's code emulation engine after easily bypassing other major antivirus software products. 8/4/2014 By Kelly Jackson Higgins As an experiment, Kyle Adams wrote w
READ MORE
http://www.darkreading.com/vulnerabilities---threats/how-malware-write...
Dark Reading: Secure Browser Alternatives On The Rise
Votes:9
Comments:0
The sandboxed browser on the desktop, the disposable browser session from the cloud, and now a high-security browser that by default blocks third-party cookies and online ads are all options By Kel
READ MORE
http://www.darkreading.com/vulnerabilities---threats/secure-browser-al...
Dark Reading: Lessons From 5 Advanced Attacks Of 2013
Votes:9
Comments:0
From Cryptolocker to the destructive attacks on Korean firms to the massive flood that made Spamhaus inaccessible, attackers delivered some hard lessons in 2013 By Robert Lemos December 26, 2013
READ MORE
http://www.darkreading.com/vulnerabilities---threats/lessons-from-5-ad...
Dark Reading: We're All The APT
Votes:21
Comments:0
XKeyscore, FoxAcid: APT lines are blurring By Tom Parker September 27, 2013 Despite the original, long-lost, but well-intentioned meaning of the security industry's favorite acronym, lines have
READ MORE
https://www.darkreading.com/vulnerabilities---threats/were-all-the-apt...
Dark Reading: Report: 8 Out of 10 Users Infected With A Trojan
Votes:37
Comments:0
Trojans overshadow all other forms of malware in second quarter, new study from PandaLabs shows By Kelly Jackson Higgins September 26, 2013 Trojans are king: They now account for more than thre
READ MORE
http://www.darkreading.com/vulnerabilities---threats/report-8-out-of-1...
Dark Reading: Below The Application: The High Risk Of Low-Level Threats
Votes:33
Comments:0
In-memory attacks and rootkits may hit your systems below the OS. Here are some tips to help your defense By Brad Causey July 09, 2013 Excerpted from "Below the Application: The High Risk of Lo
READ MORE
http://www.darkreading.com/vulnerabilities---threats/below-the-applica...
Dark Reading: Putting Vulnerabilities And Threats Into Context
Votes:5
Comments:0
Advanced security research should play a role in your security program and be ready when science projects become weaponized attacks By Mike Rothman June 07, 2013 Since I'm the new blogger in Da
READ MORE
http://www.darkreading.com/vulnerabilities---threats/putting-vulnerabi...
Dark Reading: BIOS Bummer: New Malware Can Bypass BIOS Security
Votes:24
Comments:0
Researchers expect to release proofs-of-concept at Black Hat that show how malware can infect BIOS, persist past updates, and fool the TPM into thinking everything's fine By Ericka Chickowski May
READ MORE
http://www.darkreading.com/vulnerabilities---threats/bios-bummer-new-m...
Dark Reading: Mass Customized Attacks Show Malware Maturity
Votes:20
Comments:0
The malware universe is typically divided into targeted attacks and mass, opportunistic attacks, but a middle category--mass customized malware--poses a more serious threat for business By Robert L
READ MORE
http://www.darkreading.com/vulnerabilities---threats/mass-customized-a...
Dark Reading: Advanced Persistent Threats: The New Reality
Votes:23
Comments:0
Once rare and sophisticated, the APT is now becoming a common attack. Is your organization ready? By Michael Cobb May 09, 2013 [Excerpted from "Advanced Persistent Threats: The New Reality," a
READ MORE
http://www.darkreading.com/vulnerabilities---threats/advanced-persiste...
Dark Reading: PandaLabs Q1 Report: Trojans Account For 80% Of Malware Infections...
Votes:38
Comments:0
In addition, China is the world's most infected country with more than 50 percent of all computers riddled with malware May 03, 2013 Bracknell, May 3, 2013. PandaLabs, Panda Security's antimalwa
READ MORE
http://www.darkreading.com/vulnerabilities---threats/pandalabs-q1-repo...
Dark Reading: Websites Harbor Fewer Flaws, But Most Have At Least One Serious Vu...
Votes:18
Comments:0
SQL injection drops out of WhiteHat Security's top 10 website vulnerability list By Kelly Jackson Higgins May 02, 2013 Websites now contain fewer numbers of serious security vulnerabilities, bu
READ MORE
http://www.darkreading.com/vulnerabilities---threats/websites-harbor-f...
Dark Reading: Five Habits Of Highly Successful Malware
Votes:11
Comments:0
It's no secret that malware is dodging defenses; security experts pinpoint successful strategies, including the use of real-time communications, frequent disguises, and laying low By Robert Lemos
READ MORE
http://www.darkreading.com/vulnerabilities---threats/five-habits-of-hi...
Dark Reading: Should Insiders Really Be Your Biggest Concern?
Votes:4
Comments:0
Verizon's Data Breach Investigations Report shows that by volume of breach occurrences, external attackers cause problems the majority of the time By Ericka Chickowski April 23, 2013 Yesterday'
READ MORE
http://www.darkreading.com/vulnerabilities---threats/should-insiders-r...
Dark Reading: Time To Dump Antivirus As Endpoint Protection?
Votes:38
Comments:0
Attackers find it easy to avoid signature- and heuristic-based anti-malware defenses. Experts recommend alternatives to antivirus programs be used alongside them, not in lieu of them By Robert Lemo
READ MORE
http://www.darkreading.com/vulnerabilities---threats/time-to-dump-anti...
Dark Reading: 10 Web Threats That Could Harm Your Business
Votes:25
Comments:0
Easily overlooked vulnerabilities can put your data and business at risk Mar 15, 2013 By Robert Lemos SQL injections accounted for about 7% of Web attacks in 2011 and looked to be petering out,
READ MORE
http://www.darkreading.com/vulnerabilities---threats/10-web-threats-th...
Dark Reading: Move Over, APTs -- The RAM-Based Advanced Volatile Threat Is Spinn...
Votes:19
Comments:0
By attacking random access memory, AVT creators make their exploits less persistent -- and harder to detect Feb 22, 2013 By Tim Wilson For security pros, the advanced persistent threat (APT) h
READ MORE
http://www.darkreading.com/vulnerabilities---threats/move-over-apts---...
Dark Reading: Malware: The Next Generation
Votes:18
Comments:0
Zero-day and rapidly morphing malware is proliferating across the Web. Is your enterprise ready to stop it? Feb 04, 2013 By Ericka Chickowski If January is anything to go by, then 2013 should b
READ MORE
http://www.darkreading.com/vulnerabilities---threats/malware-the-next-...
Dark Reading: How Cybercriminals Choose Their Targets And Tactics
Votes:38
Comments:0
Targeted attacks are becoming pervasive. Here's a look at how those targets are chosen -- and how your organization might avoid being one of them Jan 13, 2013 By Randy George [Excerpted from "H
READ MORE
http://www.darkreading.com/vulnerabilities---threats/how-cybercriminal...
Dark Reading: Automated Malware Analysis Under Attack
Votes:23
Comments:0
Malware writers go low-tech in their latest attempt to escape detection, waiting for human input -- a mouse click -- before running their code Dec 20, 2012 By Robert Lemos The world suddenly ch
READ MORE
http://www.darkreading.com/vulnerabilities---threats/automated-malware...
Dark Reading: 4 Signs That Apple's Sharpening Its Security Game
Votes:26
Comments:0
Apple is quietly making some subtle, incremental security moves in the face of new threats to its products Jun 28, 2012 By Kelly Jackson Higgins Subtle but significant signals over the past few
READ MORE
http://www.darkreading.com/vulnerabilities---threats/4-signs-that-appl...
Dark Reading: When Antivirus Fails, All Is Not Lost
Votes:37
Comments:0
Following Flame, Stuxnet, and Duqu, even the antivirus industry is questioning its ability to stop targeted attacks. Yet other technologies exist to catch malware in the corporate network Jun 05, 2
READ MORE
http://www.darkreading.com/vulnerabilities---threats/when-antivirus-fa...
Dark Reading: Malware Encryption Efforts Mixed, But Getting Stronger
Votes:14
Comments:0
Russian botnets mostly use crypto, Chinese attacks mostly don't, but attack analysis finds that the bad guys are increasingly using better encryption Apr 10, 2012 By Robert Lemos When a new sof
READ MORE
http://www.darkreading.com/vulnerabilities---threats/malware-encryptio...
Dark Reading: SCADA Security In A Post-Stuxnet World
Votes:33
Comments:0
More SCADA bugs, exploits in the wake of Stuxnet, but gradually improving security in some products, new data shows Nov 06, 2012 By Kelly Jackson Higgins New data points illustrate just what a
READ MORE
http://www.darkreading.com/vulnerabilities---threats/scada-security-in...
Dark Reading: Newly Discovered Mac OS X, Android Trojans Reflect Cybercriminals'...
Votes:38
Comments:0
New crimeware kit is being built specifically for OS X, and new Android Trojan builds a botnet Feb 28, 2011 By Kelly Jackson Higgins Microsoft's and Adobe's software are still some of the bigge
READ MORE
http://www.darkreading.com/vulnerabilities---threats/newly-discovered-...
Dark Reading: Many Microsoft Vulnerabilities Not Exploitable With Proper System ...
Votes:3
Comments:0
New study by eEye finds that just disabling some unneeded features can mitigate most attacks against flaws Feb 23, 2011 By Kelly Jackson Higgins Not all security vulnerabilities can actually be
READ MORE
http://www.darkreading.com/vulnerabilities---threats/many-microsoft-vu...
Dark Reading: Legitimate Sites Are Most Likely To Serve Up Malware, Cisco Study ...
Votes:20
Comments:0
About a third of all malware is encountered in the U.S., Cisco annual security study finds Jan 31, 2013 By Tim Wilson Legitimate sites and advertisements on the Web are much more likely to del
READ MORE
http://www.darkreading.com/vulnerabilities---threats/legitimate-sites-...
Dark Reading: Most Popular Internet Sites Consistently Serving Up Malware
Votes:20
Comments:0
Study of Alexa's top 25,000 sites finds 58 serving drive-by downloads of malicious code Apr 03, 2012 By Tim Wilson Some of the Internet's oldest and most popular websites are being used to deli
READ MORE
http://www.darkreading.com/vulnerabilities---threats/most-popular-inte...
Dark Reading: Tech Insight: Layering Up For Malware Protection
Votes:3
Comments:0
No one layer of threat detection technology can sufficiently protect the enterprise today from malicious code - a look at five best practices Jan 21, 2011 By Adam Ely Malware has traditionally
READ MORE
http://www.darkreading.com/vulnerabilities---threats/tech-insight-laye...
Dark Reading: Tech Insight: Six Security Threats You Need To Know About
Votes:24
Comments:0
Security pros will have their hands full with revamped versions of current threats, while new ones also will bubble to the top Jan 07, 2011 By John Sawyer Security professionals were inundated
READ MORE
http://www.darkreading.com/vulnerabilities---threats/tech-insight-six-...
Dark Reading: Possible New Threat: Malware That Targets Hardware
Votes:18
Comments:0
Researchers demonstrate proof-of-concept for developing malware that attacks specific hardware processors with 'surgical' precision Nov 17, 2010 By Kelly Jackson Higgins French researchers say
READ MORE
http://www.darkreading.com/vulnerabilities---threats/possible-new-thre...
Dark Reading: Malware Advancing Faster Than Companies Can Analyze It
Votes:19
Comments:0
Only 17 percent catch malware targeting their organizations, new survey by Forrest Anderson Research and commissioned by Norman ASA finds Mar 08, 2012 By Kelly Jackson Higgins IT is worried: Mo
READ MORE
http://www.darkreading.com/vulnerabilities---threats/malware-advancing...
Dark Reading: 70 Percent Of Infected Consumer Machines Hit With Multiple Malware...
Votes:31
Comments:0
New Sourcefire Immunet and ClamAV data provides snapshot of consumer malware threats Aug 09, 2011 By Kelly Jackson Higgins Most infected consumer Windows machines are infested with more than on
READ MORE
http://www.darkreading.com/vulnerabilities---threats/70-percent-of-inf...
Dark Reading: Windows 8 Security Stresses Exploit Prevention
Votes:4
Comments:0
A look at some of the key security features in the Microsoft's new OS Dec 20, 2012 By Kelly Jackson Higgins Windows 8 won't be under the Christmas tree for most enterprises this year: It's too
READ MORE
http://www.darkreading.com/vulnerabilities---threats/windows-8-securit...
Dark Reading: 80 Percent Of Attacks In 2012 Were Redirects From Legitimate Sites
Votes:20
Comments:0
This and more in the new Sophos Threat Report -- outlining the changing threats and new platforms challenging IT security Dec 04, 2012 Sophos today released its Security Threat Report 2013, a de
READ MORE
http://www.darkreading.com/vulnerabilities---threats/80-percent-of-att...
Dark Reading: Companies Need Defenses Against Mobile Malware
Votes:19
Comments:0
While infection rates -- at least in the U.S. -- remain low, cybercriminals are writing more malware for Android, Symbian, and other platforms. At some point, they'll find the right recipe for profit
READ MORE
http://www.darkreading.com/vulnerabilities---threats/companies-need-de...
Dark Reading: Researchers Report New, 'Indestructible' Botnet
Votes:22
Comments:0
TDL-4 features new defenses, Kaspersky researchers say; other experts not so sure about the 'indestructible' part Jun 30, 2011 By Tim Wilson A new version of the TDL botnet features capabilitie
READ MORE
http://www.darkreading.com/vulnerabilities---threats/researchers-repor...
Dark Reading vulnerabilities and threats articles
Internet Marketing in North Carolina
,
Internet Marketing in California
Sites of Interest
Internet Marketing in New York
New Items
Dark Reading: Ransomware Has E
Dark Reading: Newly Discovered
CIO: 4 information security th
CSO: Remain paranoid, err vigi
CSO: Ransomworm: the next leve
InfoWorld - Security Adviser:
PCWorld: The year ransomware b
PC Magazine: The Best Encrypti
InfoWorld - Security Adviser:
Dark Reading: Spammers Work Up
-
Subscribe
Internet Marketing in Illinois
Internet Marketing in Texas
Search
Search
Search
Search
Login
Privacy Policy