Follow Dark Reading:
 May 19, 2018
LATEST SECURITY NEWS & COMMENTARY
New Research Seeks to Shorten Attack Dwell Time
It can take months for an organization to know they've been hacked. A new DARPA-funded project seeks to reduce that time to hours.
Actor Advertises Japanese PII on Chinese Underground
The dataset contains 200 million rows of information stolen from websites across industries, likely via opportunistic access.
How to Hang Up on Fraud
Three reasons why the phone channel is uniquely vulnerable to spoofing and what call centers are doing about it.
New Mexico Man Sentenced on DDoS, Gun Charges
Using DDoS for hire services and possessing firearms as a felon combine to land a New Mexico man 15 years in federal prison.
Syrian Electronic Army Members Indicted for Conspiracy
Two men have been charged for their involvement in a plot to commit computer hacking as members of the Syrian Electronic Army.
MORE NEWS & COMMENTARY
HOT TOPICS
The Risks of Remote Desktop Access Are Far from Remote
RDP is used by fraudsters to steal and monetize data more often than you might think. But there are ways to stay safe.

Get Ready for 'WannaCry 2.0'
Another widespread worm attack is "inevitable," but spreading a different more lucrative or destructive payload, experts say.

Phishing Attack Bypasses Two-Factor Authentication
Hacker Kevin Mitnick demonstrates a phishing attack designed to abuse multi-factor authentication and take over targets' accounts.

MORE
EDITORS' CHOICE

Cracking 2FA: How It's Done and How to Stay Safe
Two-factor authentication is a common best security practice but not ironclad. Here's how it can be bypassed, and how you can improve security.
Taming the Chaos of Application Security: 'We Built an App for That'
Want to improve the state of secure software coding? Hide the complexity from developers.
Tech Resources

Partner Perspectives

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

Electroneum Cryptomining Targets Microsoft IIS 6.0 Vulnerability
New campaign shows that there are still systems exposed to the year-old CVE-2017-7269 vuln on an operating system that was declared end-of-life three years ago.

Report: More Breaches Despite Increasing Security Budgets
Lack of security talent, low security awareness among employees, and too much data to analyze tops the list of cyberthreats in the 2018 Cyberthreat Defense Threat Report from CyberEdge group.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.