Follow Dark Reading:
 May 15, 2018
LATEST SECURITY NEWS & COMMENTARY
'EFAIL' Email Encryption Flaw Research Stirs Debate
A newly revealed vulnerability in email encryption is a big problem for a small subset of users.
Smashing Silos and Building Bridges in the IT-Infosec Divide
A strong relationship between IT and security leads to strong defense, but it's not always easy getting the two to collaborate.
Facebook Suspends 200 Apps
Thousands of apps have been investigated as Facebook determines which had access to large amounts of user data before its 2014 policy changes.
Why Enterprises Can't Ignore Third-Party IoT-Related Risks
There's a major disconnect between Internet of Things governance and risk management, according to a new report. Follow these five steps to address the risks.
Shadow IoT Devices Pose a Growing Problem for Organizations
An Infoblox survey shows many companies have thousands of non-business Internet of Things devices connecting to their network daily.
Chili's Suffers Data Breach
The restaurant believes malware was used to collect payment card data including names and credit or debit numbers.
MORE NEWS & COMMENTARY
HOT TOPICS
Phishing Attack Bypasses Two-Factor Authentication
Hacker Kevin Mitnick demonstrates a phishing attack designed to abuse multi-factor authentication and take over targets' accounts.

Phishing Threats Move to Mobile Devices
Mobile devices are emerging as a primary gateway for phishing attacks aimed at stealing data.

Microsoft's Patch Tuesday Fixes Two CVEs Under Active Attack
This month's updates addressed vulnerabilities in Windows, Office, Edge, Internet Explorer, .Net Framework, Exchange Server, and other services.

MORE
EDITORS' CHOICE

8 Ways Hackers Can Game Air Gap Protections
Isolating critical systems from connectivity isn't a guarantee they can't be hacked.
Ready or Not: Transport Layer Security 1.3 Is Coming
Better encryption could mean weaker security if you're not careful.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Electroneum Cryptomining Targets Microsoft IIS 6.0 Vulnerability
New campaign shows that there are still systems exposed to the year-old CVE-2017-7269 vuln on an operating system that was declared end-of-life three years ago.

Report: More Breaches Despite Increasing Security Budgets
Lack of security talent, low security awareness among employees, and too much data to analyze tops the list of cyberthreats in the 2018 Cyberthreat Defense Threat Report from CyberEdge group.

4 Critical Applications and How to Protect Them
Since critical apps are, well, critical, security teams must take preventive measures to keep attackers from exploiting their vulnerabilities.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.