Follow Dark Reading:
 November 22, 2017
LATEST SECURITY NEWS & COMMENTARY
New OWASP Top 10 List Includes Three New Web Vulns
But dropping cross-site request forgeries from list is a mistake, some analysts say.
Let's Take a Page from the Credit Card Industry's Playbook
Internal security departments would do well to follow the processes of major credit cards.
A Call for Greater Regulation of Digital Currencies
A new report calls for international collaboration to create more transparency with virtual currencies and track money used for cybercrime.
Half of Americans Unsure of Online Shopping Safety
Consumers struggle to determine the safety of online shopping websites, putting them at risk for holiday hacking.
Iranian Nation-State Hacker Indicted for HBO Hack, Extortion
'Winter is coming,' DoJ official says of overseas hackers such as the alleged HBO hacker who steal intellectual property from the US.
MORE NEWS & COMMENTARY
HOT TOPICS
Death of the Tier 1 SOC Analyst
Say goodbye to the entry-level security operations center (SOC) analyst as we know it.

Crooks Turn to Delivering Ransomware via RDP
In a new twist to an old attack, threats actors are increasingly using the remote access protocol to install ransomware, Sophos says

121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kaspersky Lab's internal investigation found a backdoor Trojan and other malware on the personal computer of the NSA employee who took home agency hacking tools.

MORE
EDITORS' CHOICE

6 Real Black Friday Phishing Lures
As the mega-shopping day approaches, here's a look at six examples of phishing attacks - and ways to avoid taking the bait.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cloud Security: Don't Go Blind While Playing in the Cloud

    Attend this webinar to understand the security transformation from an on-prem fortress mentality to federated cloud services functioning outside your traditional zone of control.

  • Open Source Security for Containers in a DevOps World

    Managing container infrastructure in a production environment is challenged by problems of scale. One of the biggest problems is trust--specifically trust of the application. To put it another way, can you trust that all containers in your Kubernetes or OpenShift ...

MORE WEBINARS

Partner Perspectives

'Reaper': The Professional Bot Herder's Thingbot
Is it malicious? So far it's hard to tell. For now it's a giant blinking red light in security researchers faces warning us that we'd better figure out how to secure the Internet of Things.

'Goldilocks' Legislation Aims to Clean up IoT Security
The proposed Internet of Things Cybersecurity Improvement Act of 2017 is not too hard, not too soft, and might be just right.

5 Reasons CISOs Should Keep an Open Mind about Cryptocurrency
With untold new markets for Bitcoin and other 'alt-coins,' it's going to be an exciting future -- and security leaders need to get ready for it.

FEATURED REPORTS
  • [Ponemon Report] The Value of Threat Intelligence
  • The State of Ransomware

    Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.