Follow Dark Reading:
 November 15, 2017
LATEST SECURITY NEWS & COMMENTARY
Microsoft Word Vuln Went Unnoticed for 17 Years: Report
Researchers claim Microsoft Word vulnerability, patched today, has existed for 17 years.
Companies Blindly Believe They've Locked Down Users' Mobile Use
IT security teams may be in for a surprise about their mobile exposure as the GDPR compliance deadline approaches, according to a new survey.
Russian Developer Snuck Cryptocurrency Mining into Android Apps
Apps found in Google Play turned mobile devices into cryptocurrency miners unbeknownst to their users, according to researchers from security firm Ixia.
Microsoft Uses Neural Networks to Make Fuzz Tests Smarter
Neural fuzzing can help uncover bugs in software better than traditional tools, company says.
2017 Has Broken the Record for Security Vulnerabilities
Some 40% of disclosed vulns as of Q3 are rated as severe, new Risk Based Security data shows.
What the NFL Teaches Us about Fostering a Champion Security Team
Cybersecurity experts can learn how to do a better job by keeping a close eye on the gridiron.
Enterprise Physical Security Drives IoT Adoption
The vast majority of respondents to a new survey are deploying IoT technologies for building safety in the form of security cameras.
ADT Expands Cybersecurity Business with Purchase of Datashield
Home and business security giant launches ADT Cybersecurity to offer managed detection and response (MDR) service.
Cloudflare Buys Mobile Firm Neumob
The deal will give Cloudflare technology to optimize mobile security, performance.
MORE NEWS & COMMENTARY
HOT TOPICS
New Locky Ransomware Takes Another Turn
A newly discovered strain of Locky ransomware has been discovered masquerading as legitimate Microsoft Word documents.

'Eavesdropper' Exposes Millions of Mobile Conversations
App developers fail to remove their hardcoded credentials, affecting hundreds of millions of data records.

Cybersecurity Staffing Shortage Tied to Cyberattacks, Data Breaches
Short-staffed cybersecurity teams contribute to data breaches and cyberattacks levied against their organizations, a survey finds.

MORE
EDITORS' CHOICE

Emerging IT Security Technologies: 13 Categories, 26 Vendors
A rundown of some of the hottest security product areas, and vendors helping to shape them.
6 Steps for Sharing Threat Intelligence
Industry experts offer specific reasons to share threat information, why it's important - and how to get started.
Hypervisors: Now a Tool to Protect against Security Blind Spots
By facilitating live introspection of virtual machine memory, the Xen Project is striving to eliminate stealthy attack techniques like EternalBlue.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cloud Security: Don't Go Blind While Playing in the Cloud

    Attend this webinar to understand the security transformation from an on-prem fortress mentality to federated cloud services functioning outside your traditional zone of control.

  • How Upwork Cut Zero-Day File Attacks by 70%

    Upwork has millions of clients and freelancers that have to upload and download many files to and from the platform, over a million files per day by their estimation. Upwork selected data sanitization (CDR) in order to remove threats from ...

MORE WEBINARS

Partner Perspectives

'Goldilocks' Legislation Aims to Clean up IoT Security
The proposed Internet of Things Cybersecurity Improvement Act of 2017 is not too hard, not too soft, and might be just right.

5 Reasons CISOs Should Keep an Open Mind about Cryptocurrency
With untold new markets for Bitcoin and other 'alt-coins,' it's going to be an exciting future -- and security leaders need to get ready for it.

5 Reasons Why the CISO is a Cryptocurrency Skeptic
If you think all you need is technology to defend against bad guys, you shouldn't be a CISO. But technology is all cryptocurrency is, starting with Bitcoin.

FEATURED REPORTS
  • The State of Ransomware

    Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find ...

  • How Enterprises Are Attacking the IT Security Problem

    Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.