Follow Dark Reading:
 August 22, 2019
LATEST SECURITY NEWS & COMMENTARY
Apple Misstep Leaves iPhones Open to Jailbreak
Newest version of iOS contains a critical bug that the company had previously already patched.
Towns Across Texas Hit in Coordinated Ransomware Attack
The state government and cybersecurity groups have mobilized to respond to a mass ransomware attack that simultaneously hit 22 different towns statewide.
New FISMA Report Shows Progress, Gaps in Federal Cybersecurity
No major incidents mixed with continuing gaps in implementation paint an improving, but still muddy, picture of cybersecurity in the federal government.
MoviePass Leaves Credit Card Numbers, Personal Data Exposed Online
Thousands of customers' credit card numbers, MoviePass card numbers, and sensitive data were left in an unprotected database.
VxWorks TCP/IP Stack Vulnerability Poses Major Manufacturing Risk
A new analysis shows the scale of risk posed by networking vulnerabilities in a popular embedded real-time operating system.
'Phoning Home': Your Latest Data Exfiltration Headache
Companies phone enterprise customer data home securely and for a variety of perfectly legitimate and useful reasons. The problems stem from insufficient disclosure.
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
The old-school technology is experiencing new popularity, but too many people assume mainframes are inherently secure.
MORE NEWS & COMMENTARY
HOT TOPICS
More Than 20 Data Breaches Reported Per Day in First Half of 2019
But incidents involving SSNs, addresses, birth dates were smaller than in previous years.

Tough Love: Debunking Myths about DevOps & Security
It's time to move past trivial 'shift left' conceptions of DevSecOps and take a hard look at how security work actually gets accomplished.

Project Zero Turns 5: How Google's Zero-Day Hunt Has Grown
At Black Hat USA, Project Zero's team lead shared details of projects it has accomplished and its influence on the security community.

MORE
EDITORS' CHOICE

7 Big Factors Putting Small Businesses At Risk
Small organizations still face a long list of security threats. These threats and vulnerabilities should be top of mind.
NEW FROM THE EDGE

5 Ways to Improve the Patching Process
So many software vulnerabilities, so little time. But failure to patch them can have serious consequences. Here's help for overwhelmed security teams.
FROM THE DR NEWS DESK AT BHUSA

Bad Actors Find Leverage With Automated Active Attacks
Once used only by nation-state attackers, automated active attacks have gone mainstream and allow the average cyber-criminal to gain entry and engage in malfeasance, says Chet Wisniewski, Principal Research scientist with Sophos. Luckily, organizations are getting smarter at spotting these stealthy, customized attacks earlier than they used to.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.