Follow Dark Reading:
 September 26, 2019
LATEST SECURITY NEWS & COMMENTARY
Metasploit Creator HD Moore's Latest Hack: IT Assets
Moore has built a network asset discovery tool that wasn't intended to be a pure security tool, but it addresses a glaring security problem.
When Compliance Isn't Enough: A Case for Integrated Risk Management
Why governance, risk, and compliance solutions lull companies into a false sense of security, and how to form a more effective approach.
Iranian Government Hackers Target US Veterans
'Tortoiseshell' discovered hosting a phony military-hiring website that drops a Trojan backdoor on visitors.
Russia Chooses Resiliency Over Efficiency in Cyber Ops
New analysis of the software used by espionage groups linked to Russia finds little overlap in their development, suggesting that the groups are siloed.
Ransomware Strikes 49 School Districts & Colleges in 2019
The education sector has seen 10 new victims in the past nine days alone, underscoring a consistent trend throughout 2019.
Deconstructing an iPhone Spearphishing Attack
How criminals today bypass smartphone anti-theft protection and harvest AppleID and passwords taken from fake Apple servers.
The Future of Account Security: A World Without Passwords?
First step: Convince machines that we are who we say we are with expanded biometrics, including behaviors, locations, and other information that makes "us" us.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Ways VPNs Can Turn from Ally to Threat
VPNs are critical pieces of the security infrastructure, but they can be vulnerable, hackable, and weaponized against you. Here are seven things to be aware of before you ignore your VPN.

The 20 Worst Metrics in Cybersecurity
Security leaders are increasingly making their case through metrics, as well they should - as long as they're not one of these.

A Beginner's Guide to Microsegmentation
In a world in which the data center perimeter has all but evaporated, traditional segmentation no longer is enough. Enter microsegmentation. Here's what organizations need to do to maximize the benefits of this improved security architecture.

MORE
EDITORS' CHOICE

5 Updates from PCI SSC That You Need to Know
As payment technologies evolve, so do the requirements for securing cardholder data.
6 Best Practices for Performing Physical Penetration Tests
A cautionary tale from a pen test gone wrong in an Iowa county courthouse.
NEW FROM THE EDGE

The Beginner's Guide to Denial-of-Service Attacks: A Breakdown of Shutdowns
DoS attacks come in many varieties (not just DDoS). This simple set of descriptions will help you understand how they're different - and why each and every one is bad.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.