Follow Dark Reading:
 April 30, 2019
LATEST SECURITY NEWS & COMMENTARY
Credit Card Compromise Up 212% as Hackers Eye Financial Sector
Financial services firms saw upticks in credential leaks and credit card compromise as cybercriminals go where the money is.
Peer-to-Peer Vulnerability Exposes Millions of IoT Devices
A flaw in the software used to remotely access cameras and monitoring devices could allow hackers to easily take control of millions of pieces of the IoT.
Docker Forces Password Reset for 190,000 Accounts After Breach
Organizations impacted by breach, which gave attackers illegal access to a database containing sensitive account information, need to check their container images.
A Rear-View Look at GDPR: Compliance Has No Brakes
With a year of Europe's General Data Protection Regulation under our belt, what have we learned?
Unknown, Unprotected Database Exposes Info on 80 Million US Households
A database with no login required has been found to contain names, addresses, age, and more for over 80 million U.S. households.
Black Hat USA Offers an Inside Look at Intel's Security Engine
Come to the August event and learn how Intel's Converged Security and Manageability Engine has been fine-tuned to guard against low-level firmware attacks.
MORE NEWS & COMMENTARY
HOT TOPICS
New Twist in the Stuxnet Story
What a newly discovered missing link to Stuxnet and the now-revived Flame cyber espionage malware add to the narrative of the epic cyber-physical attack.

How to Build a Cloud Security Model
Security experts point to seven crucial steps companies should be taking as they move data and processes to cloud environments.

How a Nigerian ISP Accidentally Hijacked the Internet
For 74 minutes, traffic destined for Google and Cloudflare services was routed through Russia and into the largest system of censorship in the world, China's Great Firewall.

MORE
EDITORS' CHOICE

7 Types of Experiences Every Security Pro Should Have
As the saying goes, experience is the best teacher. It'll also make you a better and more well-rounded security pro.
5 Security Challenges to API Protection
Today's application programming interfaces are no longer simple or front-facing, creating new risks for both security and DevOps.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • Managing the Risk of Post-breach or Resident Attacks

    How well-equipped is your organization to stop insider attacks or external attackers once they're inside your network? According to this study, almost two-thirds of respondents lack efficient capabilities to detect and investigate "stealth" attackers before serious damage occurs.

  • Online Malware & Threats: A Profile of Today's Security Posture

    This Dark Reading report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.