Follow Dark Reading:
 May 22, 2020
LATEST SECURITY NEWS & COMMENTARY
10 iOS Security Tips to Lock Down Your iPhone
Mobile security experts share their go-to advice for protecting iPhones from hackers, thieves, and fraudsters.
Most Bluetooth Devices Vulnerable to Impersonation Attacks
Vulnerabilities in the Bluetooth authentication process give attackers a way to insert rogue devices between two securely paired devices, academic researchers find.
Telcos Become Richer Hacking Targets
The shift of moving telecommunications networks toward more commercial networking equipment and systems also expanded their attack surface.
Web Scrapers Have Bigger-Than-Perceived Impact on Digital Businesses
The economic impact of bot traffic can be unexpectedly substantial, a PerimeterX-commissioned study finds.
The Need for Compliance in a Post-COVID-19 World
With the current upheaval, business leaders may lose focus and push off implementing security measures, managing risk, and keeping up with compliance requirements. That's a big mistake.
How an Industry Consortium Can Reinvent Security Solution Testing
By committing to independent testing to determine value, vendors will ensure that their products do what they say they do.
Hackers Serve Up Stolen Credentials from Home Chef
Some 8 million of the meal delivery company's customer records have been offered for sale on the Dark Web.
COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
MORE NEWS & COMMENTARY
HOT TOPICS
The 3 Top Cybersecurity Myths & What You Should Know
With millions of employees now attempting to work from home, it's vital to challenge misconceptions about cybersecurity.

60% of Insider Threats Involve Employees Planning to Leave
Researchers shows most "flight-risk" employees planning to leave an organization tend to start stealing data two to eight weeks before they go.

As DevOps Accelerates, Security's Role Changes
There remains a disconnect between developers and security teams, with uncertainty around who should handle software security.

MORE
EDITORS' CHOICE

7 Security Pros: What My Nontraditional Background Brings to the Job
Job experience and degrees outside of the cybersecurity or IT world can provide invaluable diversity of thinking and problem-solving.

How Cybersecurity Incident Response Programs Work (and Why Some Don’t)

Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.


NEW FROM THE EDGE

Security 101: Cross-Site Scripting
Cross-site scripting has been around longer than most security professionals have been on the job. Why is it still such an issue when we've known about it for so long?
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.