Follow Dark Reading:
 October 11, 2017
LATEST SECURITY NEWS & COMMENTARY
Microsoft Patches Windows Zero-Day Flaws Tied to DNSSEC
Security experts advise 'immediate' patching of critical DNS client vulnerabilities in Windows 8, 10, and other affected systems.
Key New Security Features in Android Oreo
Android 8.0 Oreo marks a major revamp of Google's mobile operating system, putting in a number of new security-hardening measures.
Artificial Intelligence: Experts Talk Ethical, Security Concerns
Global leaders weigh the benefits and dangers of a future in which AI plays a greater role in business and security strategy.
Unstructured Data: The Threat You Cannot See
Why security teams needs to take a cognitive approach to the increasing volumes of data flowing from sources they don't control.
Cybercrime Meets Culture In Middle East, North African Underground
Spirit of sharing and free malware a characteristic of crimeware markets in this region, Trend Micro says.
Equifax: 12.5 Million UK Client Records Exposed in Breach
But of that data, it affects 700K of British consumers, credit-monitoring company said today.
FDIC Incurs 54 Confirmed and Suspected Breaches in 2 Years
Office of Inspector General takes the Federal Deposit Insurance Corporation to task for its response to breaches.
MORE NEWS & COMMENTARY
HOT TOPICS
Russian Hackers Pilfered Data from NSA Contractor's Home Computer: Report
Classified information and hacking tools from the US National Security Agency landed in the hands of Russian cyberspies, according to a Wall Street Journal report.

New 4G, 5G Network Flaw 'Worrisome'
Weaknesses in the voice and data convergence technology can be exploited to allow cybercriminals to launch DoS attacks and hijack mobile data.

5 IT Practices That Put Enterprises at Risk
No one solution will keep you 100% protected, but if you avoid these common missteps, you can shore up your security posture.

MORE
EDITORS' CHOICE

10 Steps for Writing a Secure Mobile App
Best practices to avoid the dangers of developing vulnerability-ridden apps.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Ransomware: Latest Developments & How to Defend Against Them

    Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly are just around the corner. Learn how ransomware can affect your organization and steps you can take to defend your systems and users against ...

  • 4 Key Steps in Implementing the Data Warehouse of the Future

    Today organizations need performance and flexibility at an affordable price. A Hadoop-based environment offers just that: speed, scalability, and flexibility while minimizing disruption to a company. Join this session to learn how to implement the technology gradually, target the right ...

MORE WEBINARS

Partner Perspectives

URL Obfuscation: Still a Phisher's Phriend
There are three primary techniques to trick users into thinking a website link is real: URL shorteners, URL doppelgangers, and URL redirects.

TrickBot Rapidly Expands its Targets in August
TrickBot shifted its focus to U.S banks and credit card companies, soaring past the 1,000 target URL mark in a single configuration.

Where Do Security Vulnerabilities Come From?
There are three major causes: code quality, complexity, and trusted data inputs.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.