Follow Dark Reading:
 September 23, 2019
LATEST SECURITY NEWS & COMMENTARY
7 Ways VPNs Can Turn from Ally to Threat
VPNs are critical pieces of the security infrastructure, but they can be vulnerable, hackable, and weaponized against you. Here are seven things to be aware of before you ignore your VPN.
Ransomware Strikes 49 School Districts & Colleges in 2019
The education sector has seen 10 new victims in the past nine days alone, underscoring a consistent trend throughout 2019.
A Safer IoT Future Must Be a Joint Effort
We're just at the beginning of an important conversation about the future of our homes and cities, which must involve both consumers and many players in the industry
Deconstructing an iPhone Spearphishing Attack
How criminals today bypass smartphone anti-theft protection and harvest AppleID and passwords taken from fake Apple servers.
HP Purchases Security Startup Bromium
The purchase will bring new isolation and threat intelligence capabilities to the HP portfolio.
WeWork's Wi-Fi Exposed Files, Credentials, Emails
For years, sensitive documents and corporate data have been easily viewable on the coworking space's open network.
MORE NEWS & COMMENTARY
HOT TOPICS
Metasploit Creator HD Moore's Latest Hack: IT Assets
Moore has built a network asset discovery tool that wasn't intended to be a pure security tool, but it addresses a glaring security problem.

The 20 Worst Metrics in Cybersecurity
Security leaders are increasingly making their case through metrics, as well they should - as long as they're not one of these.

MITRE Releases 2019 List of Top 25 Software Weaknesses
The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities.

MORE
EDITORS' CHOICE

Cybercriminal's Black Market Pricing Guide
Common prices criminals pay one other for products and services that fuel the cybercriminal ecosystem.
NEW FROM THE EDGE

'Playing Around' Can Teach Serious Security Lessons
A project intended to move a small robot around a hazardous board teaches some solid security lessons.
A Beginner's Guide to Microsegmentation
In a world in which the data center perimeter has all but evaporated, traditional segmentation no longer is enough. Enter microsegmentation. Here's what organizations need to do to maximize the benefits of this improved security architecture.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.