Follow Dark Reading:
 October 18, 2019
LATEST SECURITY NEWS & COMMENTARY
Debug Feature in Web Dev Tool Exposed Trump Campaign Site, Others to Attack
The problem is not with the tool itself but with how some developers and administrators are using it, Comparitech says.
Phishing Campaign Targets Stripe Credentials, Financial Data
Attackers make use of an old trick and evade detection by blocking users from viewing an embedded link when hovering over the URL.
Cozy Bear Emerges from Hibernation to Hack EU Ministries
The cyber-espionage group, linked to Russia and blamed for hacking the Democratic National Committee in 2016, has been using covert communications and other techniques to escape detection for at least two years.
Smart Prevention: How Every Enterprise Can Create Human Firewalls
Organizations of all sizes should include both human firewalls and virtual tools in their cybersecurity budgets.
Data Privacy Protections for the Most Vulnerable - Children
The business case for why companies that respect the privacy of individuals, and especially minors, will have a strong competitive advantage.
Yahoo Breach Victims May Qualify for $358 Payout
Pending approval of the settlement, affected account holders may be eligible for a payout or two years of free credit monitoring.
Older Amazon Devices Subject to Old Wi-Fi Vulnerability
The vulnerability in first-generation Echoes and eight-generation Kindles lets an attacker wage man-in-the-middle attacks.
MORE NEWS & COMMENTARY
HOT TOPICS
14 Hot Cybersecurity Certifications Right Now
In an industry where certifications can make or break a job candidacy, which ones have security pros been going after in 2019?

How to Think Like a Hacker
In the arms race of computer security, it's never been more important to develop an adversarial mindset that can identify assumptions and determine if and how they can be violated.

Cyber Theft, Humint Helped China Cut Corners on Passenger Jet
Beijing likely saved a lot of time and billions of dollars by copying components for its C919 plane from others, a new report from CrowdStrike says.

MORE
EDITORS' CHOICE

State of SMB Insecurity by the Numbers
SMBs still perceive themselves at low risk from cyberthreats - in spite of attack statistics that paint a different picture.
NEW FROM THE EDGE

How to Build a Rock-Solid Cybersecurity Culture
In part one of this two-part series, we start with the basics - getting everyone to understand what's at stake - and then look at lessons from the trenches.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building a Security Culture

    In this webinar, learn the elements of a security culture, how to build one at your organization, and how to know it's working.

  • Protecting Your Org's Most Critical Data 101

    If you'd like to know more about the latest strategies for data defense - especially strategies for protecting your most essential information -- this Dark Reading virtual event is for you.

MORE WEBINARS
FEATURED REPORTS
  • 2018 State of the Cloud Report

    Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!

  • [Strategic Security Report] Cloud Security's Changing Landscape

    The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.