Follow Dark Reading:
 July 28, 2017
LATEST SECURITY NEWS & COMMENTARY
Inside the Investigation and Trial of Roman Seleznev
The officials who convicted the credit card thief discussed the investigation, evidence, trial, and challenges involved in his case.
How to Build a Path Toward Diversity in Information Security
Hiring women and minorities only addresses half the issue for the IT security industry -- the next step is retaining these workers.
The Lazy Habits of Phishing Attackers
Most hackers who phish accounts do little to hide their tracks or even mine all of the data they can from phished accounts, mostly because they can afford to be lazy.
Downtime from Ransomware More Lethal to Small Businesses Than the Ransom
New survey of small-to midsized businesses (SMBs) shows half of SMBs infected with malware suffer 25 hours or more of business disruption.
The Right to Be Forgotten & the New Era of Personal Data Rights
Because of the European Union's GDPR and other pending legislation, companies must become more transparent in how they protect their customers' data.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Hardware & Firmware Hacks Highlighted at Black Hat 2017
Researchers will hammer home potentially devastating attacks, and demo a range of vulnerabilities, techniques and tools.

10 Critical Steps to Create a Culture of Cybersecurity
Businesses are more vulnerable than they need to be. Here's what you should do about it.

MORE
BEST OF BLACK HAT 2017

Get Ready for the 2038 'Epocholypse' (and Worse)!
A leading security researcher predicts a sea of technology changes that will rock our world, including the Internet of Things, cryptocurrency, SSL encryption and national security.
How Attackers Use Machine Learning to Predict BEC Success
Researchers show how scammers defeat other machines, increase their success rate, and get more money from their targets.
Researchers Release Free Tool to Analyze ICS Malware
CrashOverride/Industroyer malware used against Ukraine's power grid the inspiration for the reverse-engineering tool.
Broadcom Chipset Bug in Android, iOS Smartphones Allows Remote Attack
Security researcher found a common flaw in Android and iOS smartphone chipsets that could allow a remote exploit to be unleashed on millions of devices.

More News from the Black Hat Show Floor

Check out Dark Reading's extensive news and show coverage from the Mandalay Bay in Las Vegas.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Using Threat Data to Improve Your Cyber Defense

    Attend this webinar to learn how you can determine which threats pose the greatest danger to your enterprise, and how to analyze threat data and use it to help improve your organization's cyber defense.

  • The Real Impact of a Data Security Breach

    In this webcast, experts discuss the real losses associated with a breach, both in the data center and in the business and how an effective data breach response program can help mitigate the damage.

MORE WEBINARS

Partner Perspectives

Can Your Risk Assessment Stand Up Under Scrutiny?
Weak risk assessments have gotten a pass up until now, but that may be changing.

Lessons from Verizon: Managing Cloud Security for Partners
The recent Verizon breach - data exposed by an insecure Amazon S3 bucket - highlights the need for enterprises to have visibility into how partners and other stakeholders keep their data secure.

Profile of a Hacker: The Real Sabu
There are multiple stories about how the capture of the infamous Anonymous leader Sabu went down. Here's one, and another about what he is doing today.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.