Follow Dark Reading:
 August 23, 2018
LATEST SECURITY NEWS & COMMENTARY
It Takes an Average 38 Days to Patch a Vulnerability
Analysis of 316 million-plus security incidents uncovers most common types of real-world attacks taking place within in-production Web apps in the AWS and Azure cloud ecosystems.
Adobe Software at Center of Two Vulnerability Disclosures
Newly discovered Photoshop and Ghostscript vulnerabilities allow remote code execution.
DNC Reports Attempted Cyberattack on its Voter Database
FBI is investigating phony domain posing as Votebuilder.
The Votes Are In: Election Security Matters
Three ways to make sure that Election Day tallies are true.
Attackers Using 'Legitimate' Remote Admin Tool in Multiple Threat Campaigns
Researchers from Cisco Talos say Breaking Security's Remcos software allows attackers to fully control and monitor any Windows system from XP onward.
Wickr Adds New Censorship Circumvention Feature to its Encrypted App
Secure Open Access addresses void created by Google, Amazon decision to disallow domain fronting, company says.
New Insurance Product Adds Coverage for Cryptomining Malware Losses
Product also covers all forms of illicit use of business services, including toll fraud and unauthorized use of cloud services.
MORE NEWS & COMMENTARY
HOT TOPICS
Hacker Unlocks 'God Mode' and Shares the 'Key'
A researcher proves that it's possible to break the most fundamental security on some CPUs.

Researchers Find New Fast-Acting Side-Channel Vulnerability
A group of researchers from Georgia Tech have discovered a method for pulling encryption keys from mobile devices without ever touching the phones, themselves.

Hackers Use Public Cloud Features to Breach, Persist In Business Networks
Attackers are abusing the characteristics of cloud services to launch and hide their activity as they traverse target networks.

MORE
EDITORS' CHOICE

7 Serious IoT Vulnerabilities
A growing number of employees have various IoT devices in their homes - where they're also connecting to an enterprise network to do their work. And that means significant threats loom.
Video from the DR News Desk at BHUSA

What a Forensic Analysis of 'Worst Voting Machine Ever' Turned Up
University of Copenhagen associate professor discusses what he found when he dug into some decommissioned WinVote voting machines.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Shift Your IT Paradigm & Put Your Employees 1st, Here's How...

    In this session, we'll offer strategies and tips for IT leaders and staff to serve their users and customers -- both internal and external -- by understanding the behaviors and business outcomes that are most important.

  • Active Archive & Data Repository with Hadoop

    Once you've begun to use Hadoop for ETL offload, the next logical steps on your journey toward the data warehouse of the future are to create an active archive and a data repository. This webinar will teach you how!

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.