Follow Dark Reading:
 January 16, 2020
LATEST SECURITY NEWS & COMMENTARY
Microsoft to Officially End Support for Windows 7, Server 2008
Windows 7 and Server 2008 will continue to work after Jan. 14, 2020, but will no longer receive security updates.
New Report Spotlights Changes in Phishing Techniques
Common and evolving strategies include the use of zero-font attacks, homograph attacks, and new tactics for fake attachments.
Microsoft Patches Windows Vuln Discovered by the NSA
The National Security Agency is publicly acknowledged for its finding and reporting of CVE-2020-0601, marking the start of what it says is a new approach to security.
Google Lets iPhone Users Turn Device into Security Key
The iPhone can now be used in lieu of a physical security key as a means of protecting Google accounts.
Cloud Adoption & Technology Change Create Gaps in Enterprise Security
Many companies are struggling to get a handle on risk exposure because of visibility issues, Radware survey shows.
Why Firewalls Aren't Going Anywhere
Written off multiple times as obsolete, firewalls continue to elude demise by adding features and ensuring that VPNs keep humming.
Processor Vulnerabilities Put Virtual Workloads at Risk
Meltdown, Spectre exploits will likely lead to customers making tradeoffs between performance and security of applications, especially virtual and cloud-based apps
Will This Be the Year of the Branded Cybercriminal?
Threat actors will continue to grow enterprise-style businesses that evolve just like their legitimate counterparts.

Take Our New Incident Response Survey

How well is your organization’s response processes, and how might technologies evolve in the future? We want to hear your experiences and views. Responses are completely anonymous, and those who complete the survey will be eligible to enter a drawing where five winners will receive a $50 Amazon gift card from Informa Tech.


MORE NEWS & COMMENTARY
HOT TOPICS
6 Unique InfoSec Metrics CISOs Should Track in 2020
You might not find these measurements on a standard cybersecurity department checklist. But they can help evaluate risks you haven't even considered yet.

Chinese Malware Found Preinstalled on US Government-Funded Phones
Researchers found unremovable malware preinstalled in the Unimax U686CL, a budget Android device sold by Assurance Wireless.

Major Brazilian Bank Tests Homomorphic Encryption on Financial Data
The approach allowed researchers to use machine learning on encrypted data without first decrypting it.

MORE
EDITORS' CHOICE

7 Free Tools for Better Visibility Into Your Network
It's hard to protect what you don't know is there. These free tools can help you understand just what it is that you need to protect -- and need to protect yourself from.
(Sponsored Article) Using Artificial InteIligence to Power Application Security
AI is more than one million 'If-Else' statements in a trench coat. It's technology we use to decrease threat vector identification times and increase the speed for delivering real-time security risk assessments.
NEW FROM THE EDGE

How to Comprehend the Buzz About Honeypots
Honeypots are crucial tools for security researchers and security teams. Understanding what they are and what they can do can be critical for making them safe and useful for your organization.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.