Follow Dark Reading:
 February 22, 2019
LATEST SECURITY NEWS & COMMENTARY
Cyber Extortionists Can Earn $360,000 a Year
Extortion scams capitalize on compromised credentials, sensitive data, and technical vulnerabilities on Internet-facing applications to pressure victims to pay up.
Researchers Propose New Approach to Address Online Password-Guessing Attacks
Recommended best practices not effective against certain types of attacks, they say.
Why Cybersecurity Burnout Is Real (and What to Do About It)
The constant stresses from advanced malware to zero-day vulnerabilities can easily turn into employee overload with potentially dangerous consequences. Here's how to turn down the pressure.
Attack Campaign Experiments with Rapid Changes in Email Lure Content
It's like polymorphic behavior - only the changes are in the email lures themselves, with randomized changes to headers, subject lines, and body content.
Human Negligence to Blame for the Majority of Insider Threats
In 98% of the assessments conducted for its research, Dtex found employees exposed proprietary company information on the Web - a 20% jump from 2018.
New Free Tool Scans for Chrome Extension Safety
CRXcavator scans extensions in real time based on factors including permissions, external calls, and third-party libraries.
MORE NEWS & COMMENTARY
HOT TOPICS
High Stress Levels Impacting CISOs Physically, Mentally
Some have even turned to alcohol and medication to cope with pressure.

ICS/SCADA Attackers Up Their Game
With attackers operating more aggressively and stealthily, some industrial network operators are working to get a jump on the threats.

The Anatomy of a Lazy Phish
A security engineer breaks down how easy it is for unskilled attackers to trick an unsuspecting user to submit credentials to a phishing site.

MORE
EDITORS' CHOICE

6 Tax Season Tips for Security Pros
Here are some practical ways to ensure your company's safety as Uncle Sam comes calling.
Security Analysts Are Only Human
SOC security analysts shoulder the largest cybersecurity burden. Automation is the way to circumvent the unavoidable human factor. Third in a six-part series.
Tech Resources
ACCESS TECH LIBRARY NOW

  • How to Use AI & Machine Learning to Improve Security

    A top expert offers useful definitions of terms and discusses practical applications of the AI and ML technology that might speed your incident reaction time and improve your use of IT security staff resources.

  • Practical Cyber Defense for ICS

    In this Dark Reading webinar, top experts offer insight on the threat posed to Industrial control systems (ICS) systems, and how you can expand your security strategies to protect them.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • How Data Breaches Affect the Enterprise

    This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!

  • 2018 State of the Cloud Report

    Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.