Follow Dark Reading:
 February 12, 2020
LATEST SECURITY NEWS & COMMENTARY
Cybercriminals Swap Phishing for Credential Abuse, Vuln Exploits
Infection vectors were evenly divided among phishing, vulnerability exploitation, and unauthorized credential use in 2019.
Macs See More Adware, Unwanted Apps Than PCs
The latest data from Malwarebytes show the average Mac sees almost twice as many bad apps as Windows systems, but actual malware continues to be scarce.
Microsoft Patches Exploited Internet Explorer Flaw
This month's Patch Tuesday brings fixes for 99 CVEs, including one IE flaw seen exploited in the wild.
Why Ransomware Will Soon Target the Cloud
As businesses' daily operations become more dependent on cloud services, ransomware authors will follow to maximize profits. The good news: Many of the best practices for physical servers also apply to the cloud.
Keeping a Strong Security Metrics Framework Strong
Don't just report metrics -- analyze, understand, monitor, and adjust them. These 10 tips will show you how.
CIA's Secret Ownership of Crypto AG Enabled Extensive Espionage
Crypto AG made millions selling encryption devices to more than 120 countries, which unknowingly transmitted intel back to the CIA.
Healthcare Ransomware Damage Passes $157M Since 2016
Researchers found the total cost far exceeded the amount of ransom paid to attackers.
MORE NEWS & COMMENTARY
HOT TOPICS
5 Measures to Harden Election Technology
Voting machinery needs hardware-level security. The stakes are the ultimate, and the attackers among the world's most capable.

Researchers Reveal How Smart Lightbulbs Can Be Hacked to Attack
New exploit builds on previous research involving Philips Hue Smart Bulbs.

Vixie: The Unintended Consequences of Internet Privacy Efforts
Paul Vixie says emerging encryption protocols for endpoints could "break" security in enterprise - and even home - networks.

MORE
EDITORS' CHOICE

6 Factors That Raise The Stakes For IoT Security
Developments that exacerbate the risk and complicate making Internet of Things devices more secure.
Cybersecurity Vendor Landscape Transforming as Symantec, McAfee Enter New Eras
Two years ago, Symantec and McAfee were both primed for a comeback. Today, both face big questions about their future.
NEW FROM THE EDGE

What Are Some Foundational Ways to Protect My Global Supply Chain?
Assessing supply chains is one of the more challenging third-party risk management endeavors organizations can take on.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.