Follow Dark Reading:
 February 12, 2019
LATEST SECURITY NEWS & COMMENTARY
Experian: US Suffers the Most Online Fraud
New data from the credit reporting firm shows the sheer scale of online activity in the US also has made businesses and consumers there prime targets.
What the Government Shutdown Teaches Us about Cybersecurity
As lawmakers face a Friday deadline to prevent the federal government from closing a second time, we examine the cost to the digital domain, both public and private.
Client-Side DNS Attack Emerges From Academic Research
A new DNS cache poisoning attack is developed as part of the research toward a dissertation.
OkCupid Denies Data Breach Amid Account Hack Complaints
Users on the dating website report hackers breaking into their accounts, changing email addresses, and resetting passwords.
Security Pros Agree Military Should Conduct Offensive Hacking
But it can't operate in a bubble, a new Washington Post study indicates.
New Encryption Mode Brings Sincerity and Discretion to Low-Cost Android Devices
Adantium, developed by Google, brings communication encryption to bear on storage security.
MORE NEWS & COMMENTARY
HOT TOPICS
Ransomware Attack Via MSP Locks Customers Out of Systems
Vulnerable plugin for a remote management tool gave attackers a way to encrypt systems belonging to all customers of a US-based MSP.

Serverless Computing: 'Function' vs. 'Infrastructure' as-a-Service
How much do companies really gain from offloading security duties to the cloud? Let's do the math.

New Zombie 'POODLE' Attack Bred from TLS Flaw
Citrix issues update for encryption weakness dogging the popular security protocol.

MORE
EDITORS' CHOICE

6 Reasons to Be Wary of Encryption in Your Enterprise
Encryption can be critical to data security, but it's not a universal panacea.
4 Payment Security Trends for 2019
Visa's chief risk officer anticipates some healthy changes ahead.
Tech Resources
ACCESS TECH LIBRARY NOW

  • 10 Emerging Enterprise App Threats

    Hear as application security experts offer a look at the latest and most potentially damaging threats to current enterprise apps, and how those threats can expose your organization to data compromise and theft.

  • The Key to Cloud Security

    When it comes to cloud security, consistency is everything - your cloud controls should mimic your on-premise implementations, so you have complete consistency of security policy enforcement across environments.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.