Follow Dark Reading:
 September 13, 2018
LATEST SECURITY NEWS & COMMENTARY
Creators of Tools for Building Malicious Office Docs Ditch Old Exploits
In their place is a collection of new exploits for more recently disclosed - and therefore not likely widely patched - vulnerabilities.
Modular Malware Brings Stealthy Attacks to Former Soviet States
A new malware technique is making phishing attacks harder to spot when they succeed.
Foreshadow, SGX & the Failure of Trusted Execution
Trusted execution environments are said to provide a hardware-protected enclave that runs software and cannot be accessed externally, but recent developments show they fall far short.
Malware Campaign Targeting Jaxx Wallet Holders Shut Down
A site spoofing the official Jaxx website was discovered packing several infections for Windows and Mac machines, and has been shut down.
4 Trends Giving CISOs Sleepless Nights
IoT attacks, budget shortfalls, and the skills gap are among the problems keeping security pros up at night.
Mobile Attack Rates Up 24% Globally, 44% in US
One-third of all fraud targets are mobile, a growing source of all digital transactions.
New Study Details Business Benefits of Biometrics
Biometric authentication can be good for security and for business, according to a new study from Goode Intelligence
MORE NEWS & COMMENTARY
HOT TOPICS
8 Attack Vectors Puncturing Cloud Environments
These methods may not yet be on your security team's radar, but given their impact, they should be.

The SOC Gets a Makeover
Today's security operations center is all about reducing the number of alerts with emerging technologies - and enhancing old-school human collaboration. Here's how some real-world SOCs are evolving.

TLS 1.3 Won't Break Everything
The newest version of TLS won't break everything in your security infrastructure, but you do need to be prepared for the changes it brings.

MORE
EDITORS' CHOICE

8 Cryptomining Malware Families to Keep on the Radar
Cryptojacking attacks at the hands of cryptomining malware is on the rise as these variants of Trojans, worms, and exploit kits make their rounds.
DevOps Demystified: A Primer for Security Practitioners
Key starting points for those still struggling to understand the concept.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • How Data Breaches Affect the Enterprise

    This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!

  • 2018 State of the Cloud Report

    Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.