Dark Reading

Using AI to Break Detection Models

Dark Reading Security Monitoring - 8 hours 30 min ago
Pitting machine learning bots against one another is the new spy vs. spy battle in cybersecurity today.
Categories: Dark Reading

Using AI to Break Detection Models

Dark Reading Threat Intelligence - 8 hours 30 min ago
Pitting machine learning bots against one another is the new spy vs. spy battle in cybersecurity today.
Categories: Dark Reading

Using AI to Break Detection Models

Pitting machine learning bots against one another is the new spy vs. spy battle in cybersecurity today.
Categories: Dark Reading

Lessons from Verizon: Managing Cloud Security for Partners

Dark Reading Cloud - 9 hours 30 min ago
The recent Verizon breach - data exposed by an insecure Amazon S3 bucket - highlights the need for enterprises to have visibility into how partners and other stakeholders keep their data secure.
Categories: Dark Reading

Regulators Question Wells Fargo Regarding Data Breach

Dark Reading Threat Intelligence - 11 hours 21 sec ago
Scrutiny a result of a lawyer's unauthorized release of sensitive information on tens of thousands of wealthy Well Fargo customers.
Categories: Dark Reading

Regulators Question Wells Fargo Regarding Data Breach

Scrutiny a result of a lawyer's unauthorized release of sensitive information on tens of thousands of wealthy Well Fargo customers.
Categories: Dark Reading

Regulators Question Wells Fargo Regarding Data Breach

Dark Reading Attacks and Breaches - 11 hours 21 sec ago
Scrutiny a result of a lawyer's unauthorized release of sensitive information on tens of thousands of wealthy Well Fargo customers.
Categories: Dark Reading

Custom Source Code Accounts for 93% of App Vulnerabilities

Dark Reading Threat Intelligence - 11 hours 17 min ago
A new study finds that third-party libraries account for 79% of the code found in apps, but only 7% of the vulnerabilities found in the software.
Categories: Dark Reading

Custom Source Code Accounts for 93% of App Vulnerabilities

A new study finds that third-party libraries account for 79% of the code found in apps, but only 7% of the vulnerabilities found in the software.
Categories: Dark Reading

Custom Source Code Accounts for 93% of App Vulnerabilities

Dark Reading Attacks and Breaches - 11 hours 17 min ago
A new study finds that third-party libraries account for 79% of the code found in apps, but only 7% of the vulnerabilities found in the software.
Categories: Dark Reading

Voter Registration Data from 9 States Available for Sale on Dark Web

Dark Reading Attacks and Breaches - Mon, 07/24/2017 - 5:00pm
Nearly 10 million voter records sold for just $4 over last few days, according to LookingGlass Cyber Solutions.
Categories: Dark Reading

Weather.com, Fusion Expose Data Via Google Groups Config Error

Dark Readuing Vulnerability and Threats - Mon, 07/24/2017 - 3:00pm
Companies that leaked data accidentally chose the sharing setting "public on the Internet," which enabled anyone on the Web to access all information contained in the messages
Categories: Dark Reading

Weather.com, Fusion Expose Data Via Google Groups Config Error

Dark Reading Cloud - Mon, 07/24/2017 - 3:00pm
Companies that leaked data accidentally chose the sharing setting "public on the Internet," which enabled anyone on the Web to access all information contained in the messages
Categories: Dark Reading

7 Hardware & Firmware Hacks Highlighted at Black Hat 2017

Dark Readuing Vulnerability and Threats - Mon, 07/24/2017 - 1:00pm
Researchers will hammer home potentially devastating attacks, and demo a range of vulnerabilities, techniques and tools.
Categories: Dark Reading

7 Hardware & Firmware Hacks Highlighted at Black Hat 2017

Dark Reading Cloud - Mon, 07/24/2017 - 1:00pm
Researchers will hammer home potentially devastating attacks, and demo a range of vulnerabilities, techniques and tools.
Categories: Dark Reading

7 Hardware & Firmware Hacks Highlighted at Black Hat 2017

Dark Reading Attacks and Breaches - Mon, 07/24/2017 - 1:00pm
Researchers will hammer home potentially devastating attacks, and demo a range of vulnerabilities, techniques and tools.
Categories: Dark Reading

Majority of Security Pros Let Productivity Trump Security

Dark Reading Threat Intelligence - Mon, 07/24/2017 - 10:36am
A survey found that 64% of IT security professionals will tweak security to give workers more flexibility to be productive when asked to make that move by top executives.
Categories: Dark Reading

Majority of Security Pros Let Productivity Trump Security

Dark Readuing Vulnerability and Threats - Mon, 07/24/2017 - 10:36am
A survey found that 64% of IT security professionals will tweak security to give workers more flexibility to be productive when asked to make that move by top executives.
Categories: Dark Reading

Majority of Security Pros Let Productivity Trump Security

Dark Reading Attacks and Breaches - Mon, 07/24/2017 - 10:36am
A survey found that 64% of IT security professionals will tweak security to give workers more flexibility to be productive when asked to make that move by top executives.
Categories: Dark Reading

Bots Make Lousy Dates, But Not Cheap Ones

Dark Readuing Vulnerability and Threats - Mon, 07/24/2017 - 10:30am
The danger of dating sites: If a beautiful woman asks men to click on malware, they'll probably click.
Categories: Dark Reading

Pages