News
Latest Content tagged with Security
Page 1 / 2   >   >>
Morgan Stanley Data Theft Exposes Insider Threat & Need for More Restrictions
News  |  1/14/2015  | 
In the wake of Morgan Stanley firing a financial adviser for stealing information on 350,000 wealth management clients, experts say financial firms need to "cloak and contain" access to valuable data.
Increasing Cyberthreats Pose Massive Challenge for Financial Firms
News  |  1/8/2015  | 
Capital Markets Outlook 2015: Financial firms will increase data security spending and also strengthen critical infrastructure as the industry struggles to keep up with the scale and intensity of cyber attacks.
IEX Bolsters Information Security With Top Hire From BlackRock
News  |  1/5/2015  | 
Benjamin Smith joined IEX as the private trading venue's head of information security last week. In a Q&A, Smith discusses his new role, Regulation SCI, and what exchanges and ATSs can do to combat hackers in 2015.
CFTC Increases Cyber Security Oversight for Market Structure Entities
News  |  11/6/2014  | 
Tomothy Massad, the new CFTC chairman, tells derivatives exchanges and clearinghouses they need to strengthen cyber security planning and procedures.
Banks, Bitcoin & the Blockchain
News  |  11/5/2014  | 
The Bitcoin Blockchain could offer benefits to banks that are willing to experiment with it.
Cyber Risk Is a Top Concern, 84% Tell DTCC
News  |  10/23/2014  | 
DTCC released its recent "Systemic Risk Barometer" survey showing that cyber risk is among the global financial industry's top five concerns, along with the impact of new regulations.
How One Criminal Hacker Group Stole Credentials for 800,000 Bank Accounts
News  |  10/9/2014  | 
Proofpoint report shows how one Russian-speaking criminal organization hides from security companies.
First Cryptography Advisory Board Formed for Cloud Security
News  |  10/2/2014  | 
Skyhigh Networks assembles a board of cryptography experts to consider a range of academically vetted cryptographic solutions that do not reduce functionality.
Encrypting Cloud Email Isnt as Easy as You'd Think
News  |  9/25/2014  | 
Fund managers need to consider who holds the encryption keys for cloud-based email, or face potential legal risks.
Don't Be Surprised by a Cyber Attack: Prepare, Respond, Recover
News  |  9/2/2014  | 
Cyber attacks have become inevitable, but companies that prepare for how to respond can "shrink the problem" and minimize the impact of any security breach.
Hedge Funds Raise the Urgency Level on Cyber Security
News  |  8/28/2014  | 
Hedge funds are bracing for SEC exams on cyber security preparedness in 2014, but do they need a chief information security officer?
Russian Hack Attack on Banks: Is This the Big One?
News  |  8/28/2014  | 
JPMorgan Chase and at least four other US banks have been hit by a series of coordinated attacks on account information. Was it inevitable?
What Are the True Costs of Data Breaches?
News  |  8/10/2014  | 
The cost associated with data breaches extends far beyond just the information that was stolen.
SEC Eyes Cyber-Security Planning
News  |  7/22/2014  | 
In addition to regular audits, the SEC will start to scrutinize the cyber-security preparedness of market participants.
Better Takes on Good's Mobile Security Solutions
News  |  5/20/2014  | 
Better enables corporations to automatically secure the 2 million+ third-party mobile apps available today in the Apple App Store and Google Play.
Scivantage and Stevens Institute Launch FinTech Incubator Program
News  |  5/19/2014  | 
The 12-week program supports financial service technology entrepreneurs and early-stage startups.
Beyond Heartbleed: 5 Basic Rules To Reduce Risk
News  |  5/19/2014  | 
Firms continue to migrate sensitive information into fewer web-based applications with homogenous environments, increasing the potential for damage.
The Great Cosmic Misalignment
News  |  5/8/2014  | 
How can you truly trust someone whose incentives and interests are so different from your own?
Iceland: The Next Data Center Frontier?
News  |  4/25/2014  | 
Strategically located between the US and EU, data centers operations are moving to Iceland for low-cost and renewable energy benefits.
Improving Security In the Fast-Paced World of Mobile
News  |  4/22/2014  | 
Looking at the biggest threats banks face in mobile with BITS’ security expert Jim Pitts.
Lessons Learned from Mobile Attacks in the Middle East
News  |  4/21/2014  | 
A recent malware attack targeting bank customers in the Middle East offers some tips on how such attacks can be prevented.
Mobility: Who Bears The Brunt Of Data Security & Privacy
News  |  4/18/2014  | 
OS manufacturers, app developers, and consumers all have a role to play in smartphone data security. But not everyone is equally responsible.
Smartphone Kill Switches Coming, But Critics Cry Foul
News  |  4/16/2014  | 
Smartphone makers and carriers agree to add optional kill switches to smartphones, but law enforcement officials say the anti-theft effort doesn't go far enough.
Advanced Attacks Are The New Norm, Study Says
News  |  4/4/2014  | 
According to the Websense 2014 Threat Report, most malicious exploits now are advanced and targeted.
Fighting the $3.5 Trillion Fraud Problem
News  |  3/21/2014  | 
IBM launches new software and consulting services to help organizations use big data and analytics to reduce the costs of fraud and financial crime.
DDoS Attacks Get Trickier, Traditional Defenses Fall Short
News  |  3/17/2014  | 
Popular methods of defense from Distributed Denial of Service (DDos) attacks have proven comically easily to circumvent.
FinTech Startups Benefit from Buy-Side Investment Trends
News  |  3/14/2014  | 
Cutting edge technology vendors have retargeted their products for the buy-side, a welcome change after years of stagnant technology spending.
Public Cloud Security Becoming Less of a Concern
News  |  3/13/2014  | 
The reluctance to adapt to public cloud may be a self-assessment of an IT team’s skill set.
Today's Cyber Security is a Game of Cat-and-Mouse
News  |  3/7/2014  | 
A new report from Deloitte suggest financial institutions need to rethink their approach to cyber security investments.
IBM Software Vulnerabilities Spiked In 2013
News  |  2/27/2014  | 
Most code flaws still involve non-Microsoft products, and overall patching speed has improved, study presented at RSA conference finds.
An Interesting Year for the IBOR Debate
News  |  2/25/2014  | 
Delivering the ideal IBOR solution will require fundamental changes in way businesses operate and the way front-office trading systems are used.
Enterprise Cloud Exposure Much Higher Than CIOs Expect
News  |  2/18/2014  | 
Far too many IT groups think risky cloud services are something they can simply block, but the genie is out of bottle.
Another Take on the Mobile Security and Fraud Conundrum
News  |  2/13/2014  | 
A meaningful percentage of transactions still occur via the mobile browser, whether because of missing functionality in the native app, or simply user habit.
SEC Meter Maid Nabs 2 For Bad Parking
News  |  2/10/2014  | 
For smaller firms, recent "parking scheme" charges should be call to arms to enhance surveillance platforms.
Growth of Financial Services Outsourcing: How to Drive Maximum and Sustainable Value
News  |  2/6/2014  | 
As a buyer of outsourced services, it is important to engage with these companies differently than in the past.
B2B Start-ups and Outsourcing: Lessons Learned
News  |  2/6/2014  | 
From proof of concept to external specialists, these are three valuable lessons for collaborating with technology intensive start-ups.
Convenience and Security: The Case Against Biometric Tokens
News  |  2/3/2014  | 
To improve security and convenience, couple the ubiquity of smartphones with biometric technology.
Finding the Secure Lining in the Cloud
News  |  1/31/2014  | 
37 percent of cyber-attacks are leveled at financial services companies.
SunGard Hackathon Produces Algo Trading, Visualization and Security Apps
News  |  1/31/2014  | 
Over 425 SunGard developers participated in a global 48-hour hackathon to develop new tools and ideas for SunGard clients.
Cloud Vendors Face Deeper Security Questions
News  |  1/29/2014  | 
Client hoping to provide that extra level of insurance are getting smarter about their questions around security.
ICE to Sell Parts of NYSE Technology - And Why Not?
News  |  1/13/2014  | 
If ICE can't assimilate or find a structural reason to keep hold of the acquired technology, it should go.
The Shadow-Accounting Outsource Evolution
News  |  1/9/2014  | 
Over the past decade increased complexity and transparency demands have shifted hedge funds toward outsourced shadow-accounting.
Aizawa Securities Unifies Prop and Wholesale Agency Systems on Fidessa Platform
News  |  1/8/2014  | 
Tokyo-based Aizawa Securities has outsourced its front-end trading systems to Fidessa amidst changes in the Japanese exchange trading environment.
Co-Sourcing Has Firms Re-Thinking Outsourcing Models
News  |  1/7/2014  | 
The co-sourcing model is gaining traction in firms looking to scale front and middle office.
Want a Job? Stop Complaining and Start Problem Solving
News  |  12/23/2013  | 
If you enjoy the status quo of unemployment, continue to be a victim. If you want to find work, become an expert problem solver
Network Security Has Become More Complex, Has Technology Kept Pace?
News  |  12/19/2013  | 
Advanced threats, applications and even SaaS services are increasingly utilizing non-standard and largely unmonitored ports.
Target Confirms Hackers Stole 40 Million Credit Cards
News  |  12/19/2013  | 
Hackers' 19-day heist scoops up all ingredients required to make counterfeit cards.
Banks Demand Specialized Skills for End-of-Day Transaction Reporting, Open to Outsourcing
News  |  12/13/2013  | 
Sapient Global Markets launched a close of business (CoBS) transaction reporting service for capital markets and consulting firms that is gaining traction.
Mobile Security in the Face of BYOW (yes, "W") Cross-Device Attacks & More
News  |  12/10/2013  | 
Four fundamental assertions to start the mobile security conversation
Backup Services Require More Than 'Set and Forget'
News  |  12/10/2013  | 
23-24% of small to mid-size firms across industries have never checked backups, according to BUMI's customer and partner survey.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Janice, I think I've got a message from the code father!
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.