Follow Dark Reading:
 August 29, 2019
LATEST SECURITY NEWS & COMMENTARY
Magecart Shops for Victims as E-Commerce Market Grows
In 2.5 hours of research, one security expert uncovered more than 80 actively compromised ecommerce websites.
Fancy Bear Dons Plain Clothes to Try to Defeat Machine Learning
An analysis of a sample published by the US government shows Russian espionage group APT28, also known as Fancy Bear, has stripped down its initial infector in an attempt to defeat ML-based defenses.
Facebook Patches Second Account-Takeover Flaw in Instagram
The password-recovery mechanism once again puts users of the photo- and video-sharing platform at risk.
Securing Our Infrastructure: 3 Steps OEMs Must Take in the IoT Age
Security has lagged behind adoption of the Internet of Things. The devices hold much promise, but only if a comprehensive security model is constructed.
TrickBot Comes to Cellular Carriers
A new malicious campaign seeks cell account PINs from victims.
Malware Found in Android App with 100M Users
CamScanner, a legitimate app used to scan and manage documents, was found executing payloads on Android devices.
MORE NEWS & COMMENTARY
HOT TOPICS
10 Low-Cost (or Free!) Ways to Boost Your Security AI Skills
The following hardware and software options will amplify your know-how about artificial intelligence and how to apply it to security - without busting any budgets.

Capital One Breach: What Security Teams Can Do Now
Knowing the methods of the attacker, as laid out in the federal indictment, allow us to prevent similar attacks.

'Culture Eats Policy for Breakfast': Rethinking Security Awareness Training
What's definitely not working with end-user cybersecurity awareness training - and what you can do about it.

MORE
EDITORS' CHOICE

6 Ways Airlines and Hotels Can Keep Their Networks Secure
As recent news can attest, travel and hospitality companies are prime targets for cybercriminals. Here are six privacy and security tips that can help lock down privacy and security.
NEW FROM THE EDGE

Fuzzing 101: Why Bug-Finders Still Love It After All These Years
Fuzzing is one of the basic tools in a researcher's arsenal. Here are the things you should know about this security research foundational tool.
Never Forget Your Passwords Again!
You never know what those late-night infomercials are going to turn up.
Tech Resources
ACCESS TECH LIBRARY NOW

  • How To Survive A Cyber Attack & Recover Faster

    For your business to survive a security incident, it needs to get back to doing business as soon as possible. In this webinar, learn how to prepare today, to make your business more resilient to cyber attacks tomorrow.

  • 10 Emerging Threats to Enterprise Applications

    In this Dark Reading webinar, application security experts offer a look at some of the latest and most potentially damaging threats to current enterprise apps, and how those threats can expose your organization to data compromise and theft.

MORE WEBINARS
FEATURED REPORTS
  • Threat Report: Autonomous Response

    This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks.

  • 2019 State of DevOps

    DevOps is needed in today's business environment, where improved application security is essential and users demand more applications, services, and features -- fast. We sought to see where DevOps adoption and deployment stand, this report summarizes our survey findings. Find ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.