Follow Dark Reading:
 January 23, 2018
LATEST SECURITY NEWS & COMMENTARY
Intel Says to Stop Applying Problematic Spectre, Meltdown Patch
Cause of reboot problems with its Broadwell and Haswell microprocessor patching now identified, the chipmaker said.
File Inclusion Vulns, SQL Injection Top Web Defacement Tactics
Hacktivists driven by political, religious, and other causes commonly exploit basic vulnerabilities to spread their messages, researchers say.
Satori Botnet Malware Now Can Infect Even More IoT Devices
Latest version targets systems running ARC processors.
9 Steps to More-Effective Organizational Security
Too often security is seen as a barrier, but it's the only way to help protect the enterprise from threats. Here are tips on how to strengthen your framework.
Facebook Launches 'Secure the Internet Grants' Program
The new initiative encourages universities, non-profits, and NGOs to submit applied research proposals for new security defense technologies that can be used in practice.
Most Companies Suffer Reputation Damage After Security Incidents
New Kroll Annual Global Fraud & Risk Report says 86% of companies worldwide experienced security incidents and information theft and loss in the past twelve months.
MORE NEWS & COMMENTARY
HOT TOPICS
Doh!!! The 10 Most Overlooked Security Tasks
Here's a list of gotchas that often slip past overburdened security pros.

Schneider Electric: TRITON/TRISIS Attack Used 0-Day Flaw in its Safety Controller System, and a RAT
ICS/SCADA vendor discloses in-depth analysis of a recent targeted attack against one of its customers.

Rogue Chrome, Firefox Extensions Hijack Browsers; Prevent Easy Removal
Malwarebytes describes malicious extensions as 'one of a kind'

MORE
EDITORS' CHOICE

You Break It, They Buy It: Economics, Motivations Behind Bug Bounty Hunting
Some bug hunters make 16 times the median salary of software engineers in their home countries.
Understanding Supply Chain Cyber Attacks
While the attack surface has increased exponentially because of the cloud and everything-as-a-service providers, there are still ways in which host companies can harden supply chain security.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Applying Defense-in-Depth to the Digital Battlefield
How a layered security strategy can minimize the threat and impact of a data breach.

The Startup Challenge: Safe in the Cloud from Day One
How a Seattle travel company built a rock-solid mobile app without sacrificing performance or security.

Top 3 Pitfalls of Securing the Decentralized Enterprise
Doubling down on outdated security practices while the number of users leveraging your enterprise network grows is a race to the bottom for businesses moving to distributed workflows.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.