Follow Dark Reading:
 November 10, 2020
LATEST SECURITY NEWS & COMMENTARY
New Brazilian Banking Trojan Targets Mobile Users in Multiple Countries
Ghimob is a full-fledged spy in your pocket, Kaspersky says.
Insecure APIs a Growing Risk for Organizations
Security models for application programming interfaces haven't kept pace with requirements of a non-perimeter world, Forrester says.
Data Privacy Gets Solid Upgrade With Early Adopters
The United Kingdom and the regional government of Flanders kick off four pilots of the Solid data-privacy technology from World Wide Web inventor Tim Berners-Lee, which gives users more control of their data.
7 Online Shopping Tips for the Holidays
The holidays are right around the corner, and that means plenty of online shopping. These tips will help keep you safe.
(Sponsored Article) Third-Party Remote Access Is Your Network's Weakest Link
Learn how you can keep your company's data safe and what role VPNs, phishing attacks, and privileged credentials play in relation to vendor access management.
Preventing and Mitigating DDoS Attacks: It's Elementary
Following a spate of cyberattacks nationwide, school IT teams need to act now to ensure their security solution makes the grade.
FTC Announces Consent Agreement With Zoom
The agreement covers Zoom's misleading statements on security for its audio and video calling.
MORE NEWS & COMMENTARY
HOT TOPICS
New Gitpaste-12 Botnet Exploits 12 Known Vulnerabilities
Researchers discover a new worm and botnet dubbed Gitpaste-12 for its ability to spread via GitHub and Pastebin.

NSS Labs' Abrupt Shutdown Leaves Many Unanswered Questions
Former execs and employees share some insights into the testing firm's shutdown. What does it mean for the future of security product testing?

Prepare for the Unexpected: Costs to Consider in Security Budgets
Organizations that update business models to include cybersecurity as part of a strategic planning process may be able to better withstand unexpected disruptions.

MORE
EDITORS' CHOICE

6 Cybersecurity Lessons From 2020
The COVID-19 pandemic exposed new weaknesses in enterprise cybersecurity preparedness.
The Oracle-Walmart-TikTok Deal Is Not Enough
The social media deal raises issues involving data custodianship and trusted tech partnerships.
NEW FROM THE EDGE

Bug Bounty Hunters' Pro Tips on Chasing Vulns & Money

From meditation to the right mindset, seasoned vulnerability researchers give their advice on how to maximize bug bounty profits and avoid burnout.


PARTNER EVENT

(ISC)2 Security Congress – Virtual, Nov. 16-18

Join fellow cybersecurity professionals for 3-days of industry discussion, continuing education, networking opportunities and exclusive events for security professionals at all levels – delivered straight to your computer!


Tech Resources
ACCESS TECH LIBRARY NOW

  • Business Continuity with Contact Tracing - 11/10

    In this webinar, examine the industry's leading contact tracing solution and its ecosystems; share contact tracing use cases in real- life, such as proximity tracing, hot-zone alerting, and journey mapping.

  • Automating Security Functions in Your Enterprise

    A shortage of skilled IT security professionals has given rise to a whole new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. But which tasks can enterprises safely automate? In this webinar, top ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.