Follow Dark Reading:
 September 10, 2019
LATEST SECURITY NEWS & COMMENTARY
More Than 99% of Cyberattacks Need Victims' Help
Research highlights how most criminals exploit human curiosity and trust to click, download, install, open, and send money or information.
Public Exposure Does Little to Slow China-Based Thrip APT
Over the past year, the cyber-espionage group has attacked at least 12 other companies in the military, telecom, and satellite sectors, Symantec says.
From Spyware to Ninja Cable
Attackers don't need sophisticated James Bondian hardware to break into your company. Sometimes a $99 device will do.
Texas Refuses to Pay $2.5M in Massive Ransomware Attack
The ransomware campaign affected 22 local governments, none of which have paid the attackers' $2.5 million ransom demand.
New Release Brings BlueKeep to Metasploit
All organizations with Windows infrastructures should make sure their systems are patched to current versions, Rapid7 suggests.
MORE NEWS & COMMENTARY
HOT TOPICS
New Technique Makes Passwords 14M Percent Harder to Crack, Nonprofit Claims
Tide's method for protecting passwords splinters them up into tiny pieces and stores them on distributed nodes.

Meet FPGA: The Tiny, Powerful, Hackable Bit of Silicon at the Heart of IoT
Field-programmable gate arrays are flexible, agile-friendly components that populate many infrastructure and IoT devices - and have recently become the targets of researchers finding vulnerabilities.

Phishing Campaign Uses SharePoint to Slip Past Defenses
Cybercriminals targeting financial institutions in the UK bypassed Symantec email gateway and other perimeter technologies.

MORE
EDITORS' CHOICE

7 Steps to Web App Security
Emerging technologies are introducing entirely new ways to reach, act, and interact with people. That makes app security more important than ever.
NEW FROM THE EDGE

Phishers' Latest Tricks for Reeling in New Victims
Phishing works because people are, by nature, trusting -- but these evolving phishing techniques make it even tougher for security managers to stay on top.
Just A Few Questions Before That Bank Withdrawal ...
And be ready to turn over your first born.
What Are the First Signs of a Cloud Data Leak?
Most cloud data breaches leave only trace signs of malfeasance, so it can be tricky.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE

DARK READING TECH DIGEST

Dark Reading examines the research revealed at Black Hat USA and takes a look at some of the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.

DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.