Follow Dark Reading:
 September 12, 2019
LATEST SECURITY NEWS & COMMENTARY
More Than 99% of Cyberattacks Need Victims' Help
Research highlights how most criminals exploit human curiosity and trust to click, download, install, open, and send money or information.
Chinese Group Built Advanced Trojan by Reverse Engineering NSA Attack Tool
APT3 quietly monitored an NSA attack on its systems and used the information to build a weapon of its own.
281 Arrested in International BEC Takedown
Conspirators stole more than 250,000 identities and filed more than 10,000 fraudulent tax returns, the Department of Justice reports.
Two Zero-Days Fixed in Microsoft Patch Rollout
September's Patch Tuesday addressed 80 vulnerabilities, two of which have already been exploited in the wild.
Fed Kaspersky Ban Made Permanent by New Rules
A new set of regulations converts the government ban on using Kaspersky products from a temporary rule to one that's permanent.
7 Steps to Web App Security
Emerging technologies are introducing entirely new ways to reach, act, and interact with people. That makes app security more important than ever.
Firmware: A New Attack Vector Requiring Industry Leadership
It's time for cybersecurity manufacturers and solution providers to step up and show leadership in addressing firmware security. Read why and how.
MORE NEWS & COMMENTARY
HOT TOPICS
New Technique Makes Passwords 14M Percent Harder to Crack, Nonprofit Claims
Tide's method for protecting passwords splinters them up into tiny pieces and stores them on distributed nodes.

Meet FPGA: The Tiny, Powerful, Hackable Bit of Silicon at the Heart of IoT
Field-programmable gate arrays are flexible, agile-friendly components that populate many infrastructure and IoT devices - and have recently become the targets of researchers finding vulnerabilities.

Phishing Campaign Uses SharePoint to Slip Past Defenses
Cybercriminals targeting financial institutions in the UK bypassed Symantec email gateway and other perimeter technologies.

MORE
EDITORS' CHOICE

7 Breaches & Hacks That Throw Shade on Biometric Security
Stolen fingerprints, fake hands, voice synthetization, and other nefarious techniques show biometrics has plenty of challenges.
Why Businesses Fail to Address DNS Security Exposures
Increasing awareness about the critical importance of DNS security is the first step in improving the risk of being attacked. It's time to get proactive.
NEW FROM THE EDGE

Community Projects Highlight Need for Security Volunteers
From university courses to open source self-starters, community software projects aim to solve problems for populations in need. A focus on security is required as well.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE

DARK READING TECH DIGEST

Dark Reading examines the research revealed at Black Hat USA and takes a look at some of the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.

DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.