Follow Dark Reading:
 October 05, 2020
LATEST SECURITY NEWS & COMMENTARY
Researchers Adapt AI With Aim to Identify Anonymous Authors
At Black Hat Asia, artificial intelligence and cybersecurity researchers use neural networks to attempt to identify authors, but accuracy is still wanting.
Biometric Data Collection Demands Scrutiny of Privacy Law
An IT lawyer digs into the implications of collecting biometric data, why it can't be anonymized, and what nations are doing about it.
Truncated URLs Look to Make Big Dent in Phishing
The approach is a long time in coming and will test the premise that users can more easily detect a suspicious domain from the name alone.
'Father of Identity Theft' Sentenced to 207 Months
James Jackson was convicted of mail fraud, aggravated identity theft, access device fraud, and theft of mail last year.
Emotet Spoofs DNC in New Attack Campaign
Thousands of Emotet emails contain a message body pulled directly from the Democratic National Committee website, researchers report.
MORE NEWS & COMMENTARY
HOT TOPICS
MFA-Minded Attackers Continue to Figure Out Workarounds
While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue.

Microsoft: Ransomware & Nation-State Attacks Rise, Get More Sophisticated
Malware-based attacks are out, phishing is in, along with credential stuffing and business email compromise. Microsoft recommends defensive tactics in its new report on rising threats.

The No Good, Very Bad Week for Iran's Nation-State Hacking Ops
A look at the state of Iran's cyber operations as the US puts the squeeze on it with a pile of indictments and sanctions.

MORE
EDITORS' CHOICE

3 Months for the Cybercrime Books
From July through September, US law enforcement handed down major indictments or sanctions against foreign threat groups at least six times.
Since Remote Work Isn't Going Away, Security Should Be the Focus
These three steps will help organizations reduce long-term work-from-home security risks.
NEW FROM THE EDGE

CFAA 101: A Computer Fraud & Abuse Act Primer for InfoSec Pros
From WarGames, to Aaron Swartz, to bug bounties, to Van Buren, here's what cybersecurity researchers should know about the US's primary anti-hacking law before it gets its day in the Supreme Court.
Name That Toon: Castle in the Sky
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.