Follow Dark Reading:
 August 30, 2019
LATEST SECURITY NEWS & COMMENTARY
Bug Bounties Continue to Rise, but Market Has Its Own 1% Problem
The average payout for a critical vulnerability has almost reached $3,400, but only the top bug hunters of a field of 500,000 are truly profiting.
Retadup Worm Squashed After Infecting 850K Machines
An operation involving French law enforcement, the FBI, and Avast forces Retadup to delete itself from victim machines.
New Botnet Targets Android Set-Top Boxes
ARES has already infected thousands of devices and is growing, IoT security firm says.
Privacy 2019: We're Not Ready
To facilitate the innovative use of data and unlock the benefits of new technologies, we need privacy not just in the books but also on the ground.
Google Cloud Releases Beta of Managed Service to Microsoft AD
Managed Service for Microsoft Active Directory was built to help admins handle cloud-based workloads.
Google Announces New, Expanded Bounty Programs
The company is significantly expanding the bug-bounty program for Google Play and starting a program aimed at user data protection.
MORE NEWS & COMMENTARY
HOT TOPICS
WannaCry Remains No. 1 Ransomware Weapon
Of all of the ransomware variants spotted targeting victims in the first half of 2019, the infamous WannaCry was by far the most prevalent, according to Trend Micro's detection data.

Fancy Bear Dons Plain Clothes to Try to Defeat Machine Learning
An analysis of a sample published by the US government shows Russian espionage group APT28, also known as Fancy Bear, has stripped down its initial infector in an attempt to defeat ML-based defenses.

'Culture Eats Policy for Breakfast': Rethinking Security Awareness Training
What's definitely not working with end-user cybersecurity awareness training - and what you can do about it.

MORE
EDITORS' CHOICE

6 Ways Airlines and Hotels Can Keep Their Networks Secure
As recent news can attest, travel and hospitality companies are prime targets for cybercriminals. Here are six privacy and security tips that can help lock down privacy and security.
Unsecured IoT: 8 Ways Hackers Exploit Firmware Vulnerabilities
As new Internet of Things products enter the market, speed shouldn't trump concerns about security.
NEW FROM THE EDGE

Fuzzing 101: Why Bug Hunters Still Love It After All These Years
Fuzzing is one of the basic tools in a researcher's arsenal. Here are the things you should know about this security research foundational tool.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.