Follow Dark Reading:
 February 14, 2020
LATEST SECURITY NEWS & COMMENTARY
DDoS Attacks Nearly Double Between Q4 2018 and Q4 2019
Peer-to-peer botnets, TCP reflection attacks, and increased activity on Sundays are three DDoS attack trends from last quarter.
Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems
The new threat model hones in on ML security at the design state.
Babel of IoT Authentication Poses Security Challenges
With more than 80 different schemes for authenticating devices either proposed or implemented, best practices and reference architectures are sorely needed, experts say.
Forget Hacks... Ransomware, Phishing Are Election Year's Real Threats
As we gear up for the voting season, let's put aside any links between foreign interference and voting machine security and focus on the actual risks threatening election security.
Small Business Security: 5 Tips on How and Where to Start
There is no one-size-fits-all strategy for security, but a robust plan and the implementation of new technologies will help you and your IT team sleep better.
Apps Remain Favorite Mobile Attack Vector
Mobile apps are used in nearly 80% of attacks targeting mobile devices, followed by network and operating system attacks.
Huawei Charged with RICO Violations in Federal Court
A new set of indictments adds conspiracy to violate RICO statutes to a list of existing charges against the Chinese telecommunications giant.
MORE NEWS & COMMENTARY
HOT TOPICS
RobbinHood Kills Security Processes Before Dropping Ransomware
Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files.

Cybersecurity Vendor Landscape Transforming as Symantec, McAfee Enter New Eras
Two years ago, Symantec and McAfee were both primed for a comeback. Today, both face big questions about their future.

Why Ransomware Will Soon Target the Cloud
As businesses' daily operations become more dependent on cloud services, ransomware authors will follow to maximize profits. The good news: Many of the best practices for physical servers also apply to the cloud.

MORE
EDITORS' CHOICE

7 Tax Season Security Tips
Security pros need be on high alert from now until Tax Day on April 15. Here are seven ways to help keep your company safe.
Day in the Life of a Bot
A typical workday for a bot, from its own point of view.
NEW FROM THE EDGE

Coronavirus Raises New Business Continuity, Phishing Challenges for InfoSec
What happens when understaffed security teams at home and abroad are sequestered in physical quarantine zones?
Tech Resources
ACCESS TECH LIBRARY NOW

  • The 6 Must-Haves for Practical Cloud Security

    Join us for this webinar in which we will share lessons learned from nine years of working with leading cloud adopters including household names in streaming content, wireless and telecom providers, worldwide gaming networks, financial institutions, and SaaS providers.

  • Are You Ready for When Cyber Attackers Get In?

    The cyber attackers hit their mark: now what do you do? In this webinar, learn the Xs and Os of any good security incident readiness and response playbook.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.