Follow Dark Reading:
 January 20, 2018
LATEST SECURITY NEWS & COMMENTARY
Kaspersky Lab Seeks Injunction Against US Government Ban
Revenues and reputation have taken a hit in the wake of the US Department of Homeland Security's decision to prohibit use of its products and services by the feds, the company says.
You Break It, They Buy It: Economics, Motivations Behind Bug Bounty Hunting
Some bug hunters make 16 times the median salary of software engineers in their home countries.
Understanding Supply Chain Cyber Attacks
While the attack surface has increased exponentially because of the cloud and everything-as-a-service providers, there are still ways in which host companies can harden supply chain security.
Up to 40K Affected in Credit Card Breach at OnePlus
The smartphone manufacturer has sent an email to anyone who may have been affected in the breach.
Google Pays Researcher Record $112,500 for Android Flaw
The bug bounty reward, given to a researcher who submitted a working remote exploit chain, is Google's highest for an Android bug.
MORE NEWS & COMMENTARY
HOT TOPICS
Doh!!! The 10 Most Overlooked Security Tasks
Here's a list of gotchas that often slip past overburdened security pros.

Four Malicious Google Chrome Extensions Affect 500K Users
ICEBRG Security Research team's finding highlights an often-overlooked threat.

Kaspersky Lab Warns of Extremely Sophisticated Android Spyware Tool
Skygofree appears to have been developed for lawful intercept, offensive surveillance purposes.

MORE
EDITORS' CHOICE

Tax Reform, Cybersecurity-Style
How the security industry can be more effective and efficient by recognizing four hidden "taxes" in the buying and selling process.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Dark Reading Webinar] Becoming a Threat Hunter in Your Enterprise

    Today there is a new wave of "threat hunting," in which the security team takes a more proactive approach -- attend this webinar to learn more about it!

  • DevOps Day 2

    During this session Jayne Groll, CEO of the DevOps Institute and Chair of the 2018 Interop ITX DevOps track, introduces some of the emerging practices and principles that are key to successful DevOps.

MORE WEBINARS

Partner Perspectives

Applying Defense-in-Depth to the Digital Battlefield
How a layered security strategy can minimize the threat and impact of a data breach.

The Startup Challenge: Safe in the Cloud from Day One
How a Seattle travel company built a rock-solid mobile app without sacrificing performance or security.

Top 3 Pitfalls of Securing the Decentralized Enterprise
Doubling down on outdated security practices while the number of users leveraging your enterprise network grows is a race to the bottom for businesses moving to distributed workflows.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.