Follow Dark Reading:
 May 11, 2017
LATEST SECURITY NEWS & COMMENTARY
10 Free or Low-Cost Security Tools
At a time when many organizations struggle with security funding, open-source tools can help cut costs for certain businesses.
Google Docs Phishing Scam a Game Changer
Experts expect copycats that take advantage of passive authentication from third-party applications using standards such as OAuth.
Businesses Not Properly Securing Microsoft Active Directory
Businesses overlook key security aspects of AD, leaving sensitive data open to external and internal attacks, new study shows.
And Now a Ransomware Tool That Charges Based On Where You Live
Malware is designed to charge more for victims in countries with a higher cost of living, Recorded Future says.
The Long Tail of the Intel AMT Flaw
Organizations impacted by easily exploitable privilege escalation vulnerability may need time to apply firmware patches, analysts say.
Android App Permission in Google Play Contains Security Flaw
Android's app permission mechanisms could allow malicious apps in Google Play to download directly onto the device.
MORE NEWS & COMMENTARY
HOT TOPICS
New IoT Botnet Discovered, 120K IP Cameras At Risk of Attack
The Persirai IoT botnet, which targets IP cameras, arrives hot on the heels of Mirai and highlights the growing threat of IoT botnets.

Backdoors: When Good Intentions Go Bad
Requiring encrypted applications to provide backdoors for law enforcement will weaken security for everyone.

Why Cyber Attacks Will Continue until Prevention Becomes a Priority
Organizations must rethink their security measures. Focus on training, getting rid of old tech, and overcoming apathy.

MORE
EDITORS' CHOICE

Extreme Makeover: AI & Network Cybersecurity
In the future, artificial intelligence will constantly adapt to the growing attack surface. Today, we are still connecting the dots.
Artificial Intelligence: Cybersecurity Friend or Foe?
The next generation of situation-aware malware will use AI to behave like a human attacker: performing reconnaissance, identifying targets, choosing methods of attack, and intelligently evading detection.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cyber-Attacks: Midsize Companies Think They're Safe - They Aren't

    Midsized companies are becoming an increasing hot spot for cyber-attacks. They face the same APTs and attacks as large enterprises, but have weaker defenses due to lack of resources and/or budgets. Weak defenses create not only the opportunity for ...

  • [Cybersecurity] New Methods for Managing the Skills Shortage

    In this webinar, security experts discuss methods for doing better security with fewer people, including: Time-saving tools for automating security functions, effective ways to use outsourcing and third-party services, creative places to look for new talent and the best ways ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.