Follow Dark Reading:
 February 13, 2020
LATEST SECURITY NEWS & COMMENTARY
6 Factors That Raise The Stakes For IoT Security
Developments that exacerbate the risk and complicate making Internet of Things devices more secure.
China's Military Behind 2017 Equifax Breach: DoJ
Four members of China's People Liberation Army hacked the information broker, leading to the theft of sensitive data on approximately 145 million citizens.
RobbinHood Kills Security Processes Before Dropping Ransomware
Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files.
Cybersecurity Vendor Landscape Transforming as Symantec, McAfee Enter New Eras
Two years ago, Symantec and McAfee were both primed for a comeback. Today, both face big questions about their future.
Why Ransomware Will Soon Target the Cloud
As businesses' daily operations become more dependent on cloud services, ransomware authors will follow to maximize profits. The good news: Many of the best practices for physical servers also apply to the cloud.
CIA's Secret Ownership of Crypto AG Enabled Extensive Espionage
Crypto AG made millions selling encryption devices to more than 120 countries, which unknowingly transmitted intel back to the CIA.
MORE NEWS & COMMENTARY
HOT TOPICS
5 Measures to Harden Election Technology
Voting machinery needs hardware-level security. The stakes are the ultimate, and the attackers among the world's most capable.

Researchers Reveal How Smart Lightbulbs Can Be Hacked to Attack
New exploit builds on previous research involving Philips Hue Smart Bulbs.

Keeping a Strong Security Metrics Framework Strong
Don't just report metrics -- analyze, understand, monitor, and adjust them. These 10 tips will show you how.

MORE
EDITORS' CHOICE

5 Common Errors That Allow Attackers to Go Undetected
Make these mistakes and invaders might linger in your systems for years.
Vixie: The Unintended Consequences of Internet Privacy Efforts
Paul Vixie says emerging encryption protocols for endpoints could "break" security in enterprise - and even home - networks.
NEW FROM THE EDGE

From 1s & 0s to Wobbly Lines: The Radio Frequency (RF) Security Starter Guide
Although radio frequency energy (RF) communications are increasingly essential to modern wireless networking and IoT, the security of RF is notoriously lax.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.