Follow Dark Reading:
 May 02, 2019
LATEST SECURITY NEWS & COMMENTARY
Malware Makes Itself at Home in Set-Top Boxes
Low-cost boxes that promise free TV streaming services often come complete with malware, according to a new study.
Database Leaks, Network Traffic Top Data Exfiltration Methods
Intellectual property and personally identifiable information tie for the type of data IT practitioners are worried about losing.
A Rear-View Look at GDPR: Compliance Has No Brakes
With a year of Europe's General Data Protection Regulation under our belt, what have we learned?
Staffing the Software Security Team: Who You Gonna Call?
Recruiting developers and testers from the product group is a great way to build a top-notch application security team. Here's why.
Credit Card Compromise Up 212% as Hackers Eye Financial Sector
Financial services firms saw upticks in credential leaks and credit card compromise as cybercriminals go where the money is.
Peer-to-Peer Vulnerability Exposes Millions of IoT Devices
A flaw in the software used to remotely access cameras and monitoring devices could allow hackers to easily take control of millions of pieces of the IoT.
MORE NEWS & COMMENTARY
HOT TOPICS
How to Build a Cloud Security Model
Security experts point to seven crucial steps companies should be taking as they move data and processes to cloud environments.

New Twist in the Stuxnet Story
What a newly discovered missing link to Stuxnet and the now-revived Flame cyber espionage malware add to the narrative of the epic cyber-physical attack.

How a Nigerian ISP Accidentally Hijacked the Internet
For 74 minutes, traffic destined for Google and Cloudflare services was routed through Russia and into the largest system of censorship in the world, China's Great Firewall.

MORE
EDITORS' CHOICE

7 Types of Experiences Every Security Pro Should Have
As the saying goes, experience is the best teacher. It'll also make you a better and more well-rounded security pro.
How to Help Your Board Navigate Cybersecurity's Legal Risks
What's worse than a massive data breach? A massive data breach followed by a shareholder derivative lawsuit. Learn what's at stake and what CISOs can do to mitigate the damage.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.