Follow Dark Reading:
 October 18, 2017
LATEST SECURITY NEWS & COMMENTARY
Factorization Bug Exposes Millions Of Crypto Keys To 'ROCA' Exploit
Products from Lenovo, HPE, Google, Microsoft, and others impacted by flaw in Infineon chipset.
Banks Start Broad Use of Blockchain, as JP Morgan, IBM Lead Way
Two major players announced cross-border payment networks built on blockchain technologies Monday, and more financial services will follow soon, despite opinions about Bitcoin.
InfoSec Pros Among Worst Offenders of Employer Snooping
A majority of IT security professionals admit to trolling through company information unrelated to their work -- even sensitive material.
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
The left side of the brain is logical and linear; the right side, creative. You have to use both sides of the brain to connect to your audience in your business.
Reuters: Microsoft's 2013 Breach Hit Bug Repository, Insiders Say
Five anonymous former Microsoft employees tell Reuters that Microsoft's database of internally discovered vulnerabilities was compromised in 2013, but Microsoft will not confirm it occurred.
ATM Machine Malware Sold on Dark Web
Cybercriminals are advertising ATM malware that's designed to exploit hardware and software vulnerabilities on the cash-dispensing machines.
Google Bolsters Security for Select Groups
Business leaders, political campaign teams, journalists, and other high-risk groups will receive advanced email and account protection.
MORE NEWS & COMMENTARY
HOT TOPICS
Cybersecurity's 'Broken' Hiring Process
New study shows the majority of cybersecurity positions get filled at salaries above the original compensation cap, while jobs sit unfilled an average of six months.

Secure Wifi Hijacked by KRACK Vulns in WPA2
All modern WiFi access points and devices that have implemented the protocol vulnerable to attacks that allow decryption, traffic hijacking other attacks. Second, unrelated crypto vulnerability also found in RSA code library in TPM chips.

10 Major Cloud Storage Security Slip-Ups (So Far) this Year
Accenture is the latest in a string of major companies to expose sensitive cloud data this year, following Verizon, Deloitte, and Dow Jones.

MORE
EDITORS' CHOICE

GDPR Compliance: 5 Early Steps to Get Laggards Going
If you're just getting on the EU General Data Protection Regulation bandwagon, here's where you should begin.
SAVE THE DATE

New Dark Reading Conference Will Focus on Defense
The INsecurity Conference, Nov. 29-30 at the Gaylord National Harbor in Maryland is all about helping infosecurity pros mitigate threats -- from hot topics to basic hygiene.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Ransomware: Latest Developments & How to Defend Against Them

    Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly are just around the corner. Learn how ransomware can affect your organization and steps you can take to defend your systems and users against ...

  • Ransomware: A Hunting We Will Go

    Ransomware is one of the favorite flavors of malware and is particularly vicious and showing no signs of slowing down. Join this webinar as Senior Security Researcher Kyle Wilhoit helps us to understand ransomware trends, ransomware use cases, the financial ...

MORE WEBINARS

Partner Perspectives

6 Steps to Finding Honey in the OWASP
The most famous project of the Open Web Application Security Project is getting an update. Here's what you need to know, and how you can get involved.

Can Machine Learning Outsmart Malware?
Using machine learning in the cybersecurity domain is a growing trend with many advantages, but it also has its risks.

URL Obfuscation: Still a Phisher's Phriend
There are three primary techniques to trick users into thinking a website link is real: URL shorteners, URL doppelgangers, and URL redirects.

FEATURED REPORTS
  • How Enterprises Are Attacking the IT Security Problem

    Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.

  • Surviving the IT Security Skills Shortage

    Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.