Follow Dark Reading:
 September 28, 2018
LATEST SECURITY NEWS & COMMENTARY
Google to Stop Automatically Logging Users into Chrome
The decision comes days after security researcher had blasted company for jeopardizing user privacy with browser update.
Russia's Sednit Deploys First Firmware-Level Rootkit in the Wild
The advanced persistent threat group's LoJax can install malware capable of surviving both OS reinstallation and hard disk replacement.
Security Flaw Found in Apple Mobile Device Enrollment Program
Authentication weakness in Apple's DEP could open a window of opportunity for attackers.
Alphabet's Chronicle Releases VirusTotal Enterprise
Chronicle, the cybersecurity business under Alphabet, releases a major update to VirusTotal geared toward corporate threat hunters.
Managing Data the Way We Manage Money
In the data-driven enterprise, myriad types of data have become a new form and flow of currency. Why, then, hasn't the CISO achieved parity with the CFO?
How to Keep Up Security in a Bug-Infested World
Good digital hygiene will lower your risk, and these six tips can help.
Twitter Bug May Have Exposed Millions of DMs
The year-long bug could have compromised interactions between customers and businesses, the social media firm reports.
Ransomware Attack Hits Port of San Diego
The attack began Monday and continues to have an impact on services at the port.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Dark Web Pricing Trends
For cybercriminals, the Dark Web grows more profitable every day.

The Cyber Kill Chain Gets a Makeover
A new report demonstrates how the cyber kill chain is consolidating as criminals find ways to accelerate the spread of their targeted cyberattacks.

Critical Linux Kernel Flaw Gives Root Access to Attackers
All versions of Red Hat Enterprise Linux, CentOS vulnerable to 'Mutagen Astronomy' flaw, according to Qualys.

MORE
EDITORS' CHOICE

7 Most Prevalent Phishing Subject Lines
The most popular subject lines crafted to trick targets into opening malicious messages, gleaned from thousands of phishing emails.
Mirai Authors Escape Jail Time - But Here Are 7 Other Criminal Hackers Who Didn't
Courts are getting tougher on the cybercrooks than some might realize.
Learn New Ways to Spot and Plug Vulnerabilities at Black Hat Europe
Come out to London Dec 3-6 and learn to use new tools (including the laws of physics) to identify hidden vulnerabilities.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • The State of IT and Cybersecurity

    IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!

  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.