Follow Dark Reading:
 August 15, 2018
LATEST SECURITY NEWS & COMMENTARY
Election Websites, Backend Systems Most at Risk of Cyberattack in Midterms
Both adult and kid hackers demonstrated at DEF CON how the hackable voting machine may be the least of our worries in the 2018 elections.
Microsoft ADFS Vulnerability Lets Attackers Bypass MFA
The flaw lets an attacker use the same second factor to bypass multifactor authentication for any account on the same ADFS service.
Flaws in Mobile Point of Sale Readers Displayed at Black Hat
While security is high overall for mPOS tools from companies like Square, PayPal, and iZettle, some devices have vulnerabilities that attackers could exploit to gather data and cash.
Oracle: Apply Out-of-Band Patch for Database Flaw ASAP
Flaw in the Java VM component of Oracle's Database Server is easily exploitable, security experts warn.
'Election Protection' Aims to Secure Candidates Running for Office
The kit is designed to prevent credential theft targeting people running for federal, state, and local elected offices.
Washington Man Sentenced in Ransomware Conspiracy
A guilty plea brings 18-month sentence on money laundering charges for former Microsoft employee.
MORE NEWS & COMMENTARY
HOT TOPICS
10 Threats Lurking on the Dark Web
Despite some high-profile takedowns last year, the Dark Web remains alive and well. Here's a compilation of some of the more prolific threats that loom.

Hacker Unlocks 'God Mode' and Shares the 'Key'
A researcher proves that it's possible to break the most fundamental security on some CPUs.

NSA Brings Nation-State Details to DEF CON
Hackers were eager to hear the latest from the world of nation-state cybersecurity.

MORE
EDITORS' PICKS

6 Eye-Raising Third-Party Breaches
This year's headlines have featured a number of high-profile exposures caused by third parties working on behalf of major brands.
Equifax Avoided Fines, but What If ...?
Let's imagine the consequences the company would have faced if current laws had been on the books earlier.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • The State of IT and Cybersecurity

    IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!

  • 2018 State of the Cloud Report

    Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.