Follow Dark Reading:
 August 13, 2019
LATEST SECURITY NEWS & COMMENTARY
DEF CON Voting Village: It's About 'Risk'
DHS, security experts worry about nation-state or other actors waging a disruptive or other attack on the 2020 election to sow distrust of the election process.
Security Pros, Congress Reps Talk National Cybersecurity at DEF CON
Cybersecurity and government leaders discussed why Congress is unprepared for a major cyberattack and how the two parties can collaborate.
Security Flaws Discovered in 40 Microsoft-Certified Device Drivers
Attackers can use vulnerable drivers to escalate privilege and execute malicious code in every part of the system.
Researchers Show How SQLite Can Be Modified to Attack Apps
New technique involves query hijacking to trigger a wide range of memory safety issues within the widely used database engine, Check Point says.
More Focus on Security as Payment Technologies Proliferate
Banks and merchants are expanding their payment offerings but continue to be wary of the potential fraud risk.
6 Security Considerations for Wrangling IoT
The Internet of Things isn't going away, so it's important to be aware of the technology's potential pitfalls.
FBI Plans to Monitor Social Media May Spark Privacy Issues
A new initiative to pull data from social media platforms may clash with policies prohibiting the use of information for mass surveillance.
Hackers Can Hurt Victims with Noise
Research presented at DEF CON shows that attackers can hijack Wi-Fi- and Bluetooth-connected speakers to produce damaging sounds.
MORE NEWS & COMMENTARY
HOT TOPICS
Significant Vulnerabilities Found in 6 Common Printer Brands
In a half-year project, two researchers tested six of the top enterprise printer brands and found vulnerabilities in every device, some of which allow remote execution.

Boeing 787 On-Board Network Vulnerable to Remote Hacking, Researcher Says
Boeing disputes IOActive findings ahead of security firm's Black Hat USA presentation.

New Vulnerability Risk Model Promises More-Efficient Security
Taking into account more factors than the current CVSS makes for a better assessment of actual danger.

MORE
EDITORS' CHOICE

7 Online Safety Tips for College Students
Heading back to campus soon? Here are seven tips that will get your digital house in order and keep you safe online this semester.
NEW FROM THE EDGE

Moving on Up: Ready to Climb to the Cloud?
Among the complications: traditional security tools work poorly or not at all in the cloud, and if a company screws up, the whole Internet will know.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
  • 2019 State of IT Infrastructure

    This report examines the current state of enterprise data center, storage and network infrastructure, explores how it is evolving, and looks into future plans for implementation. Read the Report today!

  • How Enterprises Are Developing Secure Applications

    IT security and application development are disparate processes that are increasingly coming together. Here's a look at how that's happening.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.