Follow Dark Reading:
 September 25, 2018
LATEST SECURITY NEWS & COMMENTARY
In Quiet Change, Google Now Automatically Logging Users Into Chrome
The change is a complete departure from Google's previous practice of keeping sign-in for Chrome separate from sign-ins to any Google service.
Microsoft Deletes Passwords for Azure Active Directory Applications
At Ignite 2018, security took center stage as Microsoft rolled out new security services and promised an end to passwords for online apps.
Fault-Tolerant Method Used for Security Purposes in New Framework
A young company has a new patent for using fault tolerance techniques to protect against malware infection in applications.
Hacking Back: Simply a Bad Idea
While the concept may sound appealing, it's rife with drawbacks and dangers.
'Scan4Yyou' Operator Gets 14-Year Sentence
A citizen of the former USSR is sentenced to 168 months for running Scan4you, an online counter antivirus service.
MORE NEWS & COMMENTARY
HOT TOPICS
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Actionable advice for tailoring the National Institute of Standards and Technology's security road map to your company's business needs.

NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Suit underscores longtime battle between vendors and labs over control of security testing protocols.

The 'Opsec Fail' That Helped Unmask a North Korean State Hacker
How Park Jin Hyok - charged by the US government for alleged computer crimes for the Sony, Bank of Bangladesh, WannaCry cyberattacks - inadvertently blew his cover via email accounts.

MORE
EDITORS' CHOICE

6 Dark Web Pricing Trends
For cybercriminals, the Dark Web grows more profitable every day.
3 Drivers Behind the Increasing Frequency of DDoS Attacks
What's causing the uptick? Motivation, opportunity, and new capabilities.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Make Your Organization's Email Safer

    With nearly all security incidents and breaches originating from both email and the web -- and the necessity of these tools for your organizations day to day operations -- how can you protect your organization from the cyberattackers and their ...

  • AI & Machine Learning - How to Improve Enterprise Security With Them

    Hear a top expert review useful definitions of AI & ML terms, and discuss some practical applications of the technology that might speed your incident reaction time and improve your use of IT security staff resources.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • How Data Breaches Affect the Enterprise

    This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!

  • How Enterprises Are Attacking the IT Security Problem

    Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.