Follow Dark Reading:
 June 26, 2018
LATEST SECURITY NEWS & COMMENTARY
Malware in South Korean Cyberattacks Linked to Bithumb Heist
Lazarus Group is likely behind a spearphishing campaign containing malicious code to download Manuscrypt malware.
WPA3 Brings New Authentication and Encryption to Wi-Fi
The Wi-Fi Alliance officially launches its latest protocol, which offers new capabilities for personal, enterprise, and IoT wireless networks.
Intel Names Window Snyder as Chief Software Security Officer
The microprocessor giant hires security veteran credited with leading both Microsoft's and Apple's security advancements.
Secure Code: You Are the Solution to Open Source's Biggest Problem
Seventy-eight percent of open source codebases examined in a recent study contain at least one unpatched vulnerability, with an average of 64 known vulnerabilities per codebase.
Midsized Organizations More Secure Than Large Ones
New report offers data and analysis as to why midsized organizations hit a cybersecurity sweet spot in terms of security efficacy.
iOS Hack Lets Attackers Brute Force iPhone, iPad Passcodes
A vulnerability in Apple's iOS lets anyone with a Lightning cable bypass the passcode entry restriction designed to protect the company's devices.
1.7 Million Phishing Emails Blocked in June: Barracuda Networks
Brand-name spoofing still a popular tactic to lure victims into giving up their login credentials and payment card information, new data shows.
MORE NEWS & COMMENTARY
HOT TOPICS
Tesla Employee Steals, Sabotages Company Data
The electric carmaker is the victim of an "extensive and damaging" insider attack, says CEO Elon Musk.

'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Hackers are using the infrastructure, meant to transmit data between applications, for command and control.

How to Prepare for 'WannaCry 2.0'
It seems inevitable that a more-powerful follow-up to last year's malware attack will hit sooner or later. You'd better get prepared.

MORE
EDITORS' CHOICE

VIRTUAL EVENT: Why Cybercriminals Attack

A day-long look, TOMORROW, Wednesday, June 27, at who your attackers are, how they behave, and what you can do about them. Keynote from Ed Amoroso, CEO, Tag Cyber, starts at 11 AM ET, followed by Vincent Liu, Partner at Bishop Fox at 12:30 PM.


8 Security Tips for a Hassle-Free Summer Vacation
It's easy to let your guard down when you're away. Hackers know that, too.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • The State of IT and Cybersecurity

    IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!

  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.