Follow Dark Reading:
 November 10, 2017
LATEST SECURITY NEWS & COMMENTARY
'Eavesdropper' Exposes Millions of Mobile Conversations
App developers fail to remove their hardcoded credentials, affecting hundreds of millions of data records.
Stealthy New PLC Hack Jumps the Air Gap
Researchers at Black Hat Europe next month will demonstrate a data-exfiltration attack on Siemens PLCs that uses combination of code manipulation and Radio Frequency (RF) emissions.
AV Vendors Have Immunity for Malware-Blocking Decisions, Court Says
Enigma Software Group had sued Malwarebytes for characterizing its anti-malware software as unsafe, but its case was dismissed.
OceanLotus APT Group Unfolds New Tactic in Cyber Espionage Campaign
The group has begun using compromised websites to profile and target entities of interest to the Vietnamese government, Volexity says.
Hypervisors: Now a Tool to Protect against Security Blind Spots
By facilitating live introspection of virtual machine memory, the Xen Project is striving to eliminate stealthy attack techniques like EternalBlue.
Cybersecurity Staffing Shortage Tied to Cyberattacks, Data Breaches
Short-staffed cybersecurity teams contribute to data breaches and cyberattacks levied against their organizations, a survey finds.
Barracuda Buys Sonian for Cloud Analytics
Barracuda snaps up Sonian to improve on cloud archiving and email security and management.
MORE NEWS & COMMENTARY
HOT TOPICS
Burnout, Culture Drive Security Talent Out the Door
Security's efforts to bridge the talent gap mean little when workers don't want to stay in the industry.

How I Infiltrated a Fortune 500 Company with Social Engineering
Getting into the company proved surprisingly easy during a contest. Find out how to make your company better prepared for real-world attacks.

Data Breach Record Exposure Up 305% from 2016
There have been 3,833 publicly disclosed data breaches in the first nine months of 2017, exposing more than seven billion records.

MORE
EDITORS' CHOICE

Inhospitable: Hospitality & Dining's Worst Breaches in 2017
Hotels and restaurants are in the criminal crosshairs this year.
Greg Touhill: How an Air Force Lieutenant Became One of Cybersecurity's Top Guns
Security Pro File: After leading cyber efforts in the military, DHS, and the federal government, the former Federal CISO now sets his sights on new security technology
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cloud Security: Don't Go Blind While Playing in the Cloud

    Attend this webinar to understand the security transformation from an on-prem fortress mentality to federated cloud services functioning outside your traditional zone of control.

  • Analytics 101: Machine Learning

    Machine learning is a key component in the Artificial Intelligence (AI) toolbox. This technology automates the building of analytical models as machines learn from experience. More enterprises are experimenting with this technology now. Are you ready?

MORE WEBINARS

Partner Perspectives

'Goldilocks' Legislation Aims to Clean up IoT Security
The proposed Internet of Things Cybersecurity Improvement Act of 2017 is not too hard, not too soft, and might be just right.

5 Reasons CISOs Should Keep an Open Mind about Cryptocurrency
With untold new markets for Bitcoin and other 'alt-coins,' it's going to be an exciting future -- and security leaders need to get ready for it.

5 Reasons Why the CISO is a Cryptocurrency Skeptic
If you think all you need is technology to defend against bad guys, you shouldn't be a CISO. But technology is all cryptocurrency is, starting with Bitcoin.

FEATURED REPORTS
  • The State of Ransomware

    Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find ...

  • [Security Breach Report] Overall Impact of & Steps to Prevent Breaches

    Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.