Follow Dark Reading:
 February 25, 2019
LATEST SECURITY NEWS & COMMENTARY
Lessons From the War on Malicious Mobile Apps
Despite the openness of the Android platform, Google has managed to keep its Play store mainly free of malware and malicious apps. Outside of the marketplace is a different matter.
To Mitigate Advanced Threats, Put People Ahead of Tech
Preventative technologies are only part of the picture and often come at the expense of the humans behind them.
New Malware Campaign Targets Job Seekers
LinkedIn profiles provide a persistent, patient threat actor with the information required to craft spear-phishing messages.
New Legislation Builds on California Data Breach Law
This bill requires businesses to notify consumers of compromised passport numbers and biometric data.
Learn to Plug (or Exploit) New Vulnerabilities at Black Hat Asia
There's no better place to bone up on the ins and outs of web security than Black Hat Asia in Singapore next month.
MORE NEWS & COMMENTARY
HOT TOPICS
The Anatomy of a Lazy Phish
A security engineer breaks down how easy it is for unskilled attackers to trick an unsuspecting user to submit credentials to a phishing site.

'Formjacking' Compromises 4,800 Sites Per Month. Could Yours Be One?
Cybercriminals see formjacking as a simple opportunity to take advantage of online retailers - and all they need is a small piece of JavaScript.

19 Minutes to Escalation: Russian Hackers Move the Fastest
New data from CrowdStrike's incident investigations in 2018 uncover just how quickly nation-state hackers from Russia, North Korea, China, and Iran pivot from patient zero in a target organization.

MORE
EDITORS' CHOICE

6 Tips for Getting the Most from Your VPN
VPNs are critical for information security. But simply having these cozy security tunnels in the toolkit isn't enough to keep an organization's data safe.
Why Cybersecurity Burnout Is Real (and What to Do About It)
The constant stresses from advanced malware to zero-day vulnerabilities can easily turn into employee overload with potentially dangerous consequences. Here's how to turn down the pressure.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.