Follow Dark Reading:
 August 29, 2017
LATEST SECURITY NEWS & COMMENTARY
10 Time-Consuming Tasks Security People Hate
Whether it is dealing with false positives, reporting to auditors, or patching software, here's the scut work security people dread.
Massive Android DDoS Botnet Derailed
WireX was being used to launch DDoS attacks against targets in multiple industries; Google removes 300 botnet-related apps from Play Store.
New York's Historic FinSec Regulation Covers DDoS, Not Just Data
Starting today, New York banks and insurers must report to authorities within 72 hours on any security event that has a 'reasonable likelihood' of causing material harm to normal operations.
Cybersecurity: An Asymmetrical Game of War
To stay ahead of the bad guys, security teams need to think like criminals, leverage AI's ability to find malicious threats, and stop worrying that machine learning will take our jobs.
US CERT Warns of Potential Hurricane Harvey Phishing Scams
Be wary of malicious emails purportedly tied to the storm, officials say.
Forcepoint Snaps Up RedOwl
The acquisition aims to bolster Forcepoint's behavioral analytics offerings.
MORE NEWS & COMMENTARY
HOT TOPICS
Apple iOS Exploit Takes Complete Control of Kernel
Researcher demonstrates 'severe' ZIVA exploit at Hack in the Box.

ROPEMAKER Attack Turns Benign Emails Hostile Post-Delivery
The intersection of email and Web technologies has given attackers a way to mess with your email after it has been delivered to your inbox, Mimecast says.

Google Removes 500 Android Apps Following Spyware Scare
Android apps embedded with an advertising software development kit removed after researchers discover its potential for stealing users' caller data.

MORE
EDITORS' CHOICE

Antivirus: From Stand-Alone Product to Endpoint Feature
Endpoint experts discuss the evolution of AV and its shift from stand-alone product to a feature in broader security tools.
Video from the DR News Desk

Insecure IoT Devices Pose Physical Threat to General Public
At the car wash, look out for attack robots. Billy Rios discusses how IoT devices could be hacked to physically attack people -- not just on factory floors, but in everyday public settings.
Tech Resources
ACCESS TECH LIBRARY NOW

  • What You Need to Know about GDPR

    GDRP is an acronym that stands for General Data Protection Regulation and it's designed to give control of personal data back to individuals and take it out of the hands of the companies that collect it for commercial use. It ...

  • CAO Discusses Their Roll & The Skills Needed to Do the Job

    LWhat does a chief analytics officer do each day? To help us answer that question we welcome Dun & Bradstreet Chief Analytics Officer, or CAO, to join us for our A2 radio show. During this session you'll learn what Chief Analytics ...

MORE WEBINARS

Partner Perspectives

Continuous Compliance and Effective Audit Preparation for the Cloud
Why audits are a necessary evil, and how they can actually help you improve your brand value.

How Quantum Computing Will Change Browser Encryption
From a protocol point of view, we're closer to a large-scale quantum computer than many people think. Here's why that's an important milestone.

Ransomware: The Tripflare in the Modern Cyberwar
With the frequency and scale of breaches on the rise, and our legacy security failing to protect us, is ransomware the catalyst we need to trigger improvement in our security postures?

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.