Follow Dark Reading:
 August 15, 2018
LATEST SECURITY NEWS & COMMENTARY
Election Websites, Backend Systems Most at Risk of Cyberattack in Midterms
Both adult and kid hackers demonstrated at DEF CON how the hackable voting machine may be the least of our worries in the 2018 elections.
Microsoft ADFS Vulnerability Lets Attackers Bypass MFA
The flaw lets an attacker use the same second factor to bypass multifactor authentication for any account on the same ADFS service.
Flaws in Mobile Point of Sale Readers Displayed at Black Hat
While security is high overall for mPOS tools from companies like Square, PayPal, and iZettle, some devices have vulnerabilities that attackers could exploit to gather data and cash.
Oracle: Apply Out-of-Band Patch for Database Flaw ASAP
Flaw in the Java VM component of Oracle's Database Server is easily exploitable, security experts warn.
'Election Protection' Aims to Secure Candidates Running for Office
The kit is designed to prevent credential theft targeting people running for federal, state, and local elected offices.
Washington Man Sentenced in Ransomware Conspiracy
A guilty plea brings 18-month sentence on money laundering charges for former Microsoft employee.
MORE NEWS & COMMENTARY
HOT TOPICS
Hacker Unlocks 'God Mode' and Shares the 'Key'
A researcher proves that it's possible to break the most fundamental security on some CPUs.

10 Threats Lurking on the Dark Web
Despite some high-profile takedowns last year, the Dark Web remains alive and well. Here's a compilation of some of the more prolific threats that loom.

NSA Brings Nation-State Details to DEF CON
Hackers were eager to hear the latest from the world of nation-state cybersecurity.

MORE
EDITORS' CHOICE

6 Eye-Raising Third-Party Breaches
This year's headlines have featured a number of high-profile exposures caused by third parties working on behalf of major brands.
Equifax Avoided Fines, but What If ...?
Let's imagine the consequences the company would have faced if current laws had been on the books earlier.
Tech Resources
ACCESS TECH LIBRARY NOW

  • How to End Phishing

    Are you suffering from agent overload, alert fatigue or the skills shortage? Do you need a better solution to document based phishing? If so, then this informative, interactive webinar is for you.

  • Continuous Security Validation for Banking, Financial Services and Insurance

    View a live demonstration of a cloud-based customizable platform that provides real-time empirical data regarding the effectiveness of enterprise security controls and also reveals the operating systems and applications most often targeted by today's active threats.

MORE WEBINARS
FEATURED REPORTS
  • The State of IT and Cybersecurity

    IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!

  • How Enterprises Are Attacking the IT Security Problem

    Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.