Follow Dark Reading:
 May 18, 2018
LATEST SECURITY NEWS & COMMENTARY
Get Ready for 'WannaCry 2.0'
Another widespread worm attack is "inevitable," but spreading a different more lucrative or destructive payload, experts say.
Federal Jury Convicts Operator of Massive Counter-Antivirus Service
Scan4You helped thousands of criminals check if AV products could detect and block their malware tools.
The Risks of Remote Desktop Access Are Far from Remote
RDP is used by fraudsters to steal and monetize data more often than you might think. But there are ways to stay safe.
Why Isn't Integrity Getting the Attention It Deserves?
A focus on integrity requires a shift in the way many approach security management, but it's one of the most promising approaches to effective enterprise security.
Tanium's Valuation Reaches $5 Billion With New Investment
Tanium has received a $175 million investment from TPG Growth.
California Teen Arrested for Phishing Teachers to Change Grades
The student faces 14 felony counts for using a phishing campaign to steal teachers' credentials and alter students' grades.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Ways Hackers Can Game Air Gap Protections
Isolating critical systems from connectivity isn't a guarantee they can't be hacked.

US Government Cybersecurity at a Crossroads
Trump reportedly kills cybersecurity coordinator position, while many agencies continue to play catch-up in their defenses.

'EFAIL' Email Encryption Flaw Research Stirs Debate
A newly revealed vulnerability in email encryption is a big problem for a small subset of users.

MORE
EDITORS' CHOICE

Cracking 2FA: How It's Done and How to Stay Safe
Two-factor authentication is a common best security practice but not ironclad. Here's how it can be bypassed, and how you can improve security.
Want Your Daughter to Succeed in Cyber? Call Her John
It's time to "do the right thing" when it comes to gender in the hiring and promotion of women in cybersecurity. Four women (and a man named John) offer practical solutions for shifting the balance.
Tech Resources

Partner Perspectives

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

Electroneum Cryptomining Targets Microsoft IIS 6.0 Vulnerability
New campaign shows that there are still systems exposed to the year-old CVE-2017-7269 vuln on an operating system that was declared end-of-life three years ago.

Report: More Breaches Despite Increasing Security Budgets
Lack of security talent, low security awareness among employees, and too much data to analyze tops the list of cyberthreats in the 2018 Cyberthreat Defense Threat Report from CyberEdge group.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.