Follow Dark Reading:
 May 11, 2018
LATEST SECURITY NEWS & COMMENTARY
Phishing Attack Bypasses Two-Factor Authentication
Hacker Kevin Mitnick demonstrates a phishing attack designed to abuse multi-factor authentication and take over targets' accounts.
Risky Business: Deconstructing Ray Ozzie's Encryption Backdoor
With the addition of secure enclaves, secure boot, and related features of "Clear," the only ones that will be able to test this code are Apple, well-resourced nations, and vendors who sell jailbreaks.
Author of TreasureHunter PoS Malware Releases Its Source Code
Leak gives threat actors a way to build newer, nastier versions of the point-of-sale malware, Flashpoint says.
Ready or Not: Transport Layer Security 1.3 Is Coming
Better encryption could mean weaker security if you're not careful.
As Personal Encryption Rises, So Do Backdoor Concerns
Geopolitical changes drive personal encryption among security pros, who are increasingly worried about encryption backdoors.
17 Zero-Days Found & Fixed in OPC-UA Industrial Protocol Implementations
Vulnerabilities in the framework used for secure data transfer in industrial systems were all fixed by March, says Kaspersky Lab.
MORE NEWS & COMMENTARY
HOT TOPICS
Why DDoS Just Won't Die
Distributed denial-of-service attacks are getting bigger, badder, and 'blended.' What you can (and can't) do about that.

Phishing Threats Move to Mobile Devices
Mobile devices are emerging as a primary gateway for phishing attacks aimed at stealing data.

Defending Against an Automated Attack Chain: Are You Ready?
Recent threats like AutoSploit bring malware-as-a-service to a whole new level. Here are four ways to be prepared.

MORE
EDITORS' CHOICE

Calculating Cloud Cost: 8 Factors to Watch
If you're not careful and don't regularly assess the impact of your usage, moving to the cloud could have a negative impact on your bottom line.

INsecurity Conference Seeks Security Pros to Speak on Best Practices

Dark Reading's second annual data defense conference will be held Oct. 23-25 in Chicago; call for speakers is issued.


Tech Resources

Partner Perspectives

Electroneum Cryptomining Targets Microsoft IIS 6.0 Vulnerability
New campaign shows that there are still systems exposed to the year-old CVE-2017-7269 vuln on an operating system that was declared end-of-life three years ago.

Report: More Breaches Despite Increasing Security Budgets
Lack of security talent, low security awareness among employees, and too much data to analyze tops the list of cyberthreats in the 2018 Cyberthreat Defense Threat Report from CyberEdge group.

4 Critical Applications and How to Protect Them
Since critical apps are, well, critical, security teams must take preventive measures to keep attackers from exploiting their vulnerabilities.

FEATURED REPORTS
  • 2018 State of the Cloud Report

    Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!

  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.