Follow Dark Reading:
 February 11, 2020
LATEST SECURITY NEWS & COMMENTARY
How North Korea's Senior Leaders Harness the Internet
Researchers learn how North Korea is expanding its Internet use in order to generate revenue and bypass international sanctions.
China's Military Behind 2017 Equifax Breach: DoJ
Four members of China's People Liberation Army hacked the information broker, leading to the theft of sensitive data on approximately 145 million citizens.
Some Democrats Lead Trump in Campaign Domain-Security Efforts
Sanders and Trump campaigns lack proper DMARC security enforcement, study finds.
Israel's Entire Voter Registry Exposed in Massive Incident
Personal details of nearly 6.5 million Israelis were out in the open after the entire registry was uploaded to an notably insecure app.
Unlocked S3 Bucket Lets 36,077 Jail Files Escape
The leaky repository belongs to JailCore, a cloud management and compliance platform used in several states' correctional facilities.
Day in the Life of a Bot
A typical workday for a bot, from its own point of view.
MORE NEWS & COMMENTARY
HOT TOPICS
C-Level & Studying for the CISSP
One CTO tells us about his belated pursuit of a foundational infosecurity certification -- why he wanted it and what it took.

Cybersecurity Vendor Landscape Transforming as Symantec, McAfee Enter New Eras
Two years ago, Symantec and McAfee were both primed for a comeback. Today, both face big questions about their future.

RobbinHood Kills Security Processes Before Dropping Ransomware
Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files.

MORE
EDITORS' CHOICE

6 Factors That Raise The Stakes For IoT Security
Developments that exacerbate the risk and complicate making Internet of Things devices more secure.
Ransomware Attacks: Why It Should Be Illegal to Pay the Ransom
For cities, states and towns, paying up is short-sighted and only makes the problem worse.
NEW FROM THE EDGE

From 1s & 0s to Wobbly Lines: The Radio Frequency (RF) Security Starter Guide
Although radio frequency energy (RF) communications are increasingly essential to modern wireless networking and IoT, the security of RF is notoriously lax.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.