Follow Dark Reading:
 February 02, 2018
LATEST SECURITY NEWS & COMMENTARY
Poor Visibility, Weak Passwords Compromise Active Directory
Security experts highlight the biggest problems they see putting Microsoft Active Directory at risk.
Crypto-Mining Attacks Emerge as the New Big Threat to Enterprises
Attackers looking to hijack systems for illegally mining digital currencies have begun eyeing business systems, security vendors say.
Adobe to Patch Flash Zero-Day Discovered in South Korean Attacks
Critical use-after-free vulnerability being used in targeted attacks.
Thinking about a Career Move in Cybersecurity?
The numbers show career opportunities for cyber defenders.
Securing Cloud-Native Apps
A useful approach for securing cloud-native platforms can be adapted for securing apps running on top of the platform as well.
'Ransomware' Added to Oxford English Dictionary
The term is one of 1,100 new entries added to the Oxford English Dictionary this week.
Lieberman Software Acquired by Bomgar
Deal combines privileged access management products, technologies.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Issues Emergency Patch to Disable Intel's Broken Spectre Fix
Affected Windows systems can also be set to "disable" or "enable" the Intel microcode update for Spectre attacks.

DNS Hijacking: The Silent Threat That's Putting Your Network at Risk
The technique is easy to carry out and can cause much damage. Here's what you need to know about fighting back.

Former CIA CTO Talks Meltdown and Spectre Cost, Federal Threats
Gus Hunt, former technology leader for the CIA, explains the potential long-term cost of Meltdown and Spectre.

MORE
EDITORS' CHOICE

IoT Botnets by the Numbers
IoT devices are a botherder's dream attack-vector.

Cartoon: C-Suite & Cybersecurity

John Klossner's humorous look inside the corporate board room.


Tech Resources

Partner Perspectives

Ramnit's Holiday Shopping Spree: Retailers & E-commerce
This past season, the authors of a traditional banking Trojan focused on what people do between Thanksgiving and New Year's Day: shop, eat, check their bank account, and entertain.

Data Encryption: 4 Common Pitfalls
To maximize encryption effectiveness you must minimize adverse effects in network performance and complexity. Here's how.

Selling Cloud-Based Cybersecurity to a Skeptic
When it comes to security, organizations don't need to look at cloud as an either/or proposition. But there are misconceptions that need to be addressed.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.