Follow Dark Reading:
 January 16, 2019
LATEST SECURITY NEWS & COMMENTARY
Hijacking a PLC Using its Own Network Features
Researcher to show how attackers can exploit the built-in advanced connectivity functions in some Rockwell PLCs.
Why Cyberattacks Are the No. 1 Risk
The paradigm shift toward always-on IT requires business leaders to rethink their defense strategy.
Online Fraud: Now a Major Application Layer Security Problem
The explosion of consumer-facing online services and applications is making it easier and cheaper for cybercriminals to host malicious content and launch attacks.
Former IBM Security Execs Launch Cloud Data Security Startup
Sonrai Security, the brainchild of two execs from IBM Security and Q1 Labs, debuts with $18.5 million in Series A funding.
Report: Bots Add Volume to Account Takeover Attacks
Bots that can launch hundreds of attacks per second are making account takeover fraud more difficult to defend against.
US Judge: Police Can't Force Biometric Authentication
Law enforcement cannot order individuals to unlock devices using facial or fingerprint scans, a California judge says.
SEC Issues Charges in 'Edgar' Database Hack
One defendant is still facing charges issued in 2015 for a $30 million hacking and securities fraud scheme.
MORE NEWS & COMMENTARY
HOT TOPICS
Advanced Phishing Scenarios You Will Most Likely Encounter This Year
In 2019, there will be no end in sight to email-driven cybercrime such as business email compromise, spearphishing, and ransomware.

Who Takes Responsibility for Cyberattacks in the Cloud?
A new CSA report addresses the issue of breach responsibility as more organizations move ERP application data the cloud.

DNS Hijacking Campaign Targets Organizations Globally
A group believed to be operating out of Iran has manipulated DNS records belonging to dozens of firms in an apparent cyber espionage campaign, FireEye says.

MORE
EDITORS' CHOICE

7 Privacy Mistakes That Keep Security Pros on Their Toes
When it comes to privacy, it's the little things that can lead to big mishaps.
Kudos to the Unsung Rock Stars of Security
It is great to have heroes, but the real security heroes are the men and women who keep the bad guys out while fighting their own organizations at the same time.
Tech Resources
ACCESS TECH LIBRARY NOW

  • 4 Ways Replacing AV with a Security Platform Can Help You

    What if it was possible to have a single platform that simplified your security stack and improved your protection? Register and join us for this live webinar to find out more.

  • The Key to Cloud Security

    When it comes to cloud security, consistency is everything - your cloud controls should mimic your on-premise implementations, so you have complete consistency of security policy enforcement across environments.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.