Follow Dark Reading:
 February 14, 2018
LATEST SECURITY NEWS & COMMENTARY
Microsoft Fixes Two Security Flaws in Outlook
February security patches include updates for 50 vulnerabilities, 14 of which are critical.
Lazarus Group Attacks Banks, Bitcoin Users in New Campaign
A new Lazarus Group cyberattack campaign combines spear-phishing techniques with a cryptocurrency scanner designed to scan for Bitcoin wallets.
As Primaries Loom, Election Security Efforts Behind Schedule
While federal agencies lag on vulnerability assessments and security clearance requests, the bipartisan Defending Digital Democracy Project releases three new resources to help state and local election agencies with cybersecurity, incident response.
Can Android for Work Redefine Enterprise Mobile Security?
Google's new mobility management framework makes great strides in addressing security and device management concerns while offering diverse deployment options. Here are the pros and cons.
Fake News: Could the Next Major Cyberattack Cause a Cyberwar?
In the way it undercuts trust, fake news is a form of cyberattack. Governments must work to stop it.
Equifax Names New CISO
Former Home Depot CISO takes the reins in the wake of Equifax's massive data breach and fallout.
MORE NEWS & COMMENTARY
HOT TOPICS
New Zero-Day Ransomware Evades Microsoft, Google Cloud Malware Detection
Shurl0ckr, a form of Gojdue ransomware, was not detected on SharePoint or Google Drive.

New POS Malware Steals Data via DNS Traffic
UDPoS is disguised to appear like a LogMeIn service pack, Forcepoint says.

One in Three SOC Analysts Now Job-Hunting
The more experienced a SOC analyst gets, the more his or her job satisfaction declines, a new survey of security operations center staffers shows.

MORE
EDITORS' CHOICE

8 Nation-State Hacking Groups to Watch in 2018
The aliases, geographies, famous attacks, and behaviors of some of the most prolific threat groups.
AI and Machine Learning: Breaking Down Buzzwords
Security experts explain two of today's trendiest technologies to explain what they mean and where you need them.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Your Identity-aware Infrastructure

    Join Darran Rolls, the CTO & CISO of SailPoint, the leader in the Gartner Magic Quadrant for Identity Governance and Administration, as he demonstrates how to build an identity-aware infrastructure.

  • Strategies for Monitoring & Measuring Cloud Security

    In this Dark Reading webinar, a top expert offers a look at practices and tools that will help your team monitor security in IT environments that incorporate many cloud applications and services.

MORE WEBINARS

Partner Perspectives

BrickerBot: Internet Vigilantism Ends Don't Justify the Means
However noble the intention, obtaining unauthorized access to devices and making them unusable is illegal and undermines the work of ethical researchers.

Top Cloud Security Misconceptions Plaguing Enterprises
Contrary to popular opinion, there is no one single cloud. There are a wealth of cloud-based providers that own dedicated server space across the globe. Here's how to find the best fit for your company.

Ramnit's Holiday Shopping Spree: Retailers & E-commerce
This past season, the authors of a traditional banking Trojan focused on what people do between Thanksgiving and New Year's Day: shop, eat, check their bank account, and entertain.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.