Follow Dark Reading:
 October 19, 2017
LATEST SECURITY NEWS & COMMENTARY
New Locky Ransomware Strain Emerges
Latest version goes by the .asasin extension and is collecting information on users' computer operating system and IP address.
Secure Wifi Hijacked by KRACK Vulns in WPA2
All modern WiFi access points and devices that have implemented the protocol vulnerable to attacks that allow decryption, traffic hijacking other attacks. Second, unrelated crypto vulnerability also found in RSA code library in TPM chips.
Game Change: Meet the Mach37 Fall Startups
CEOs describe how they think their fledgling ventures will revolutionize user training, privacy, identity management and embedded system security.
What's Next After HTTPS: A Fully Encrypted Web?
As the rate of HTTPS adoption grows faster by the day, it's only a matter of time before a majority of websites turn on SSL. Here's why.
Security No. 1 Inhibitor to Microsoft Office 365 Adoption
More businesses are switching to Office 365 despite fear of social engineering and ransomware attacks, but some remain wary.
Kaspersky Lab and the AV Security Hole
It's unclear what happened in the reported theft of NSA data by Russian spies, but an attacker would need little help to steal if he or she had privileged access to an AV vendor's network, security experts say.
MORE NEWS & COMMENTARY
HOT TOPICS
Cybersecurity's 'Broken' Hiring Process
New study shows the majority of cybersecurity positions get filled at salaries above the original compensation cap, while jobs sit unfilled an average of six months.

DHS to Require All Fed Agencies to Use DMARC, HTTPS, and STARTTLS
The move follows a DHS review of federal government agencies' steps to secure email and deploy authentication technologies.

Getting the Most Out of Cyber Threat Intelligence
How security practitioners can apply structured analysis and move from putting out fires to fighting the arsonists.

MORE
EDITORS' CHOICE

10 Major Cloud Storage Security Slip-Ups (So Far) this Year
Accenture is the latest in a string of major companies to expose sensitive cloud data this year, following Verizon, Deloitte, and Dow Jones.
SAVE THE DATE!

New Dark Reading Conference Will Focus on Defense
The INsecurity Conference, Nov. 29-30 at the Gaylord National Harbor in Maryland is all about helping infosecurity pros mitigate threats -- from hot topics to basic hygiene.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Security for the IoT

    In this webcast, experts discuss the most effective approaches to securing Internet-enabled systems and offer advice on monitoring and protecting next-generation IoT technology. Register today!

  • Ransomware: Latest Developments & How to Defend Against Them

    Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly are just around the corner. Learn how ransomware can affect your organization and steps you can take to defend your systems and users against ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.