New BIND Vulnerabilities Threaten DNS Availability

A pair of vulnerabilities in BIND could leave some organizations without DNS.

Dark Reading Conference Call for Speakers Closes Friday

Don't be shy, security practitioners.
Share your best practices at our 2nd annual INsecurity Conference, to be held Oct. 23-25 in Chicago.

Google to Delete ‘Secure’ Label from HTTPS Sites

Google acknowledges HTTPS as the Internet standard with plans to remove 'secure' from all HTTPS sites.

‘Roaming Mantis’ Android Malware Evolves, Expands Targets

Roaming Mantis has evolved rapidly, adding geographies, platforms, and capabilities to its original scope.

Get Smart About Network Segmentation & Traffic Routing

Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

What Israel’s Elite Defense Force Unit 8200 Can Teach Security about...

Unit 8200 doesn't follow a conventional recruiting model.

Technical knowledge isn't a requirement.

The unit values traits that emphasize problem-solving and interpersonal skills, and it uses hiring processes that build female leaders.

Actor Advertises Japanese PII on Chinese Underground

The dataset contains 200 million rows of information stolen from websites across industries, likely via opportunistic access.

New Mexico Man Sentenced on DDoS, Gun Charges

Using DDoS for hire services and possessing firearms as a felon combine to land a New Mexico 15 years in federal prison.

Syrian Electronic Army Members Indicted for Conspiracy

Two men have been charged for their involvement in a plot to commit computer hacking as members of the Syrian Electronic Army.

How to Hang Up on Fraud

Three reasons why the phone channel is uniquely vulnerable to spoofing and what call centers are doing about it.

New Research Seeks to Shorten Attack Dwell Time

It can take months for an organization to know they've been hacked.

A new DARPA-funded project seeks to reduce that time to hours.

Get Ready for ‘WannaCry 2.0’

Another widespread worm attack is "inevitable," but spreading a different more lucrative or destructive payload, experts say.