Follow Dark Reading:
 December 14, 2020
LATEST SECURITY NEWS & COMMENTARY
7 Security Tips for Gamers
Gamers can expect to be prime targets over the holidays as COVID-19 rages on. Here's some advice on how to keep hackers at bay.
Penetration Testing: A Road Map for Improving Outcomes
As cybersecurity incidents gain sophistication, to ensure we are assessing security postures effectively, it is critical to copy real-world adversaries' tools, tactics, and procedures during testing activities.

(Sponsored Article) Identity and Access Management: Looking Ahead to 2021

As the pandemic continues, having an IAM strategy in place will become paramount for organizations to thrive in the remote work world. Here's what is on the horizon for IAM in 2021.


Microsoft Warns of Powerful New Adware
The new adware, dubbed Adrozek, is being distributed by large, well organized threat actors, according to Microsoft research.
FBI, CISA, MS-ISAC: Cybercriminals Increasingly Attacking K-12 Distance Learning
Ransomware attacks reported against US K-12 schools jumped from 28% in January through July to 57% in August and September.
MORE NEWS & COMMENTARY
HOT TOPICS
'Fingerprint-Jacking' Attack Technique Manipulates Android UI
Researchers explore fingerprint-jacking, a user interface-based attack that targets fingerprints scanned into Android apps.

Attackers Know Microsoft 365 Better Than You Do
Users have taken to Microsoft Office 365's tools, but many are unaware of free features that come with their accounts -- features that would keep them safe.

Nation-State Hackers Breached FireEye, Stole Its Red Team Tools
"Novel techniques" used by the attackers cheated security tools and forensics, according to FireEye CEO Kevin Mandia.

MORE
EDITORS' CHOICE

FireEye Breach Fallout Yet to Be Felt
Aftermath of the FireEye breach by Russia's foreign service agency raises concerns over what the attackers could do next - and how to defend against it.
The Line Between Physical Security & Cybersecurity Blurs as World Gets More Digital
Security teams are being challenged by the connected nature of IP devices, and preventing them from being compromised by cybercriminals has become an essential part of keeping people and property safe.
LATEST FROM THE EDGE

'Tis the Season to Confront Third-Party Risk
On any given day it's hard to ensure that outside companies and individuals adhere to an organization's security practices and policies. But when it's the holidays and, oh, a global pandemic, companies need to be extra vigilant.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Business Continuity with Contact Tracing - 11/10

    In this webinar, examine the industry's leading contact tracing solution and its ecosystems; share contact tracing use cases in real- life, such as proximity tracing, hot-zone alerting, and journey mapping.

  • Automating Security Functions in Your Enterprise

    A shortage of skilled IT security professionals has given rise to a whole new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. But which tasks can enterprises safely automate? In this webinar, top ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.