Follow Dark Reading:
 May 17, 2018
LATEST SECURITY NEWS & COMMENTARY
Frequency & Costs of DNS-Based Attacks Soar
The average cost of a DNS attack in the US has climbed 57% over the last year to $654,000 in 2018, a survey from EfficientIP shows.
Newly Discovered Malware Targets Telegram Desktop
Russian-speaking attacker behind new malware capable of lifting credentials, cookies, desktop cache, and key files.
IT Pros Worried About IoT But Not Prepared to Secure It
Few organizations have a security policy in place for Internet of Things devices, new survey shows.
Want Your Daughter to Succeed in Cyber? Call Her John
It's time to "do the right thing" when it comes to gender in the hiring and promotion of women in cybersecurity. Four women (and a man named John) offer practical solutions for shifting the balance.
FIDO Alliance Appoints Facebook to Board of Directors
Facebook joins Google, Microsoft, Amazon, and Intel, all among major influential tech companies backing FIDO authentication.
Hackers Stole Funds from Mexican Banks
Attack targeted nation's bank payment system with shades of SWIFT heist.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Ways Hackers Can Game Air Gap Protections
Isolating critical systems from connectivity isn't a guarantee they can't be hacked.

Phishing Attack Bypasses Two-Factor Authentication
Hacker Kevin Mitnick demonstrates a phishing attack designed to abuse multi-factor authentication and take over targets' accounts.

Gandcrab Ransomware Exploits Website Vulnerabilities
Researchers find campaigns distributing Gandcrab by hosting malware on legitimate websites with poor security measures.

MORE
EDITORS' CHOICE

7 Tools for Stronger IoT Security, Visibility
If you don't know what's on your IoT network, you don't know what to protect -- or protect from. These tools provide visibility into your network so you can be safe with (and from) what you see.
Taming the Chaos of Application Security: 'We Built an App for That'
Want to improve the state of secure software coding? Hide the complexity from developers.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Last Chance] Today's Dark Reading Crash Course

    Hear as a top expert discusses the many - and sometimes hidden - costs of a data breach, including its impact on customers and end users.

  • Cyber Threats to ICS, Are You Ready?

    Top experts offer insight on the threat posed to industrial control systems (ICS) and other vertical-industry systems, and how you can expand your enterprise security strategies to protect them.

MORE WEBINARS

Partner Perspectives

Electroneum Cryptomining Targets Microsoft IIS 6.0 Vulnerability
New campaign shows that there are still systems exposed to the year-old CVE-2017-7269 vuln on an operating system that was declared end-of-life three years ago.

Report: More Breaches Despite Increasing Security Budgets
Lack of security talent, low security awareness among employees, and too much data to analyze tops the list of cyberthreats in the 2018 Cyberthreat Defense Threat Report from CyberEdge group.

4 Critical Applications and How to Protect Them
Since critical apps are, well, critical, security teams must take preventive measures to keep attackers from exploiting their vulnerabilities.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.