Follow Dark Reading:
 January 09, 2019
LATEST SECURITY NEWS & COMMENTARY
New 'Crypto Dusting' Attack Gives Cash, Takes Reputation
This new form of crypto wallet fraud enlists unwary consumers and companies to help defeat anti-money laundering methods for law enforcement and regulators.
Humana Breaches Reflect Chronic Credential Theft in Healthcare
A series of 2018 cybersecurity incidents shows credential stuffing is a trend to watch among healthcare organizations.
Remote Code Execution Bugs Are Primary Focus of January Patch Tuesday
This month's security update includes seven patches ranked Critical and one publicly known vulnerability.
Security Matters When It Comes to Mergers & Acquisitions
The recently disclosed Marriott breach exposed a frequently ignored issue in the M&A process.
Whitfield Diffie Joins Quantum Xchange Advisory Board
The noted cryptography expert has joined the advisory board of the quantum key exchange provider.
20-Year Old Student Admits to Massive Data Leak in Germany
Hack was not politically motivated; no sign of third-party involvement, authorities say.
Sophos Buys Cloud Security Company
Deal gives Sophos a new AI-based cloud security platform.
MORE NEWS & COMMENTARY
HOT TOPICS
Emotet Malware Gets More Aggressive
Emotet's operators have been adding new capabilities, making the malware now even more dangerous to its enterprise targets.

Ex-NSA Contractor Was a Suspect In Shadow Brokers Leak
New court document shows law enforcement suspected possible involvement of Harold Martin in Shadow Brokers' release of classified NSA hacking tools.

Threat of a Remote Cyberattack on Today's Aircraft Is Real
We need more stringent controls and government action to prevent a catastrophic disaster.

MORE
EDITORS' CHOICE

How Intel Has Responded to Spectre and Meltdown
In a newly published editorial and video, Intel details what specific actions it has taken in the wake of the discovery of the CPU vulnerabilities.
Your Life Is the Attack Surface: The Risks of IoT
To protect yourself, you must know where you're vulnerable - and these tips can help.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • The Risk Management Struggle

    The majority of organizations are struggling to implement a risk-based approach to security -- even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!

  • Online Malware & Threats: A Profile of Today's Security Posture

    This Dark Reading report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.