Follow Dark Reading:
 August 09, 2019
LATEST SECURITY NEWS & COMMENTARY
Equifax CISO: 'Trust Starts and Ends with You'
Organizational culture is key to good enterprise security posture, Jamil Farshchi told Black Hat attendees.
How Behavioral Data Shaped a Security Training Makeover
A new program leveraged behavioral data of employees to determine when they excelled at security and where they needed improvement.
WhatsApp Messages Can Be Intercepted, Manipulated
Check Point security researchers demonstrate how a dangerous security weakness in the messaging application can be abused to spread fake news and carry out online scams.
Siemens S7 PLCs Share Same Crypto Key Pair, Researchers Find
Researchers at Black Hat USA reveal how security authentication weaknesses in popular Siemens ICS family let them control a PLC.
Yes, FaceApp Really Could Be Sending Your Data to Russia
FaceApp has an unprecedented level of access to data from 150 million users. What could its endgame be? We unpack three potential risks.
Ransomware Shifts Focus from Consumers to Businesses
In addition, ransomware seems likely to continue its evolution in the second half of 2019.
MORE NEWS & COMMENTARY
HOT TOPICS
How to Keep Your Web Servers Secure
The good news is that Web servers have come a long way in terms of security. But to err is human, even for IT and security people.

Capital One: What We Should Learn This Time
Where Capital One went wrong, what the bank did right, and more key takeaways from the latest mega-breach.

Cisco Pays $8.6M in First False Claims Suit for Vulnerabilities in Security Product
A security consultant reported vulnerabilities in Cisco's Video Surveillance Manager in 2009 - but the company ignored the issues and fired the consultant.

MORE
EDITORS' CHOICE

8 Head-Turning Ransomware Attacks to Hit City Governments
Hackers know vulnerable systems when they see them, and they also know this: Many government systems are decades old, running Windows 7 and even Windows XP.
NEW FROM THE EDGE

Slow Your Roll Before Disclosing a Security Incident
Transparency rules, but taking the right amount of time to figure out what happened will go a long way toward setting the record straight.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.