Follow Dark Reading:
 February 04, 2020
LATEST SECURITY NEWS & COMMENTARY
Researchers Find 24 'Dangerous' Android Apps with 382M Installs
Shenzhen Hawk Internet Co. is identified as the parent company behind five app developers seeking excessive permissions in Android apps.
EKANS Ransomware Raises Industrial-Control Worries
Although the ransomware is unsophisticated, the malware does show that some crypto-attackers are targeting certain industrial control products.
Attackers Actively Targeting Flaw in Door-Access Controllers
There's been a sharp increase in scans for vulnerable Nortek Linear Emerge E3 systems, SonicWall says.
How Device-Aware 2FA Can Defeat Social Engineering Attacks
While device-aware two-factor authentication is no panacea, it is more secure than conventional SMS-based 2FA. Here's why.
Coronavirus Phishing Attack Infects US, UK Inboxes
Cybercriminals capitalize on fears of a global health emergency with phishing emails claiming to offer advice for protecting against coronavirus.
Bad Certificate Knocks Teams Offline
Microsoft allowed a certificate to expire, knocking the Office 365 version of Teams offline for almost an entire day.
MORE NEWS & COMMENTARY
HOT TOPICS
Two Vulnerabilities Found in Microsoft Azure Infrastructure
Researchers detail the process of finding two flaws in the Azure Stack architecture and Azure App Service, both of which have been patched.

Threat Hunting Is Not for Everyone
Threat hunting is a sophisticated, advanced technique that should be reserved for specific instances and be conducted only by trained professionals.

Aftermath of a Major ICS Hacking Contest
Pwn2Own Miami could help spur more research on and attention to the security of industrial control system products, experts say.

MORE
EDITORS' CHOICE

9 Things Application Security Champions Need to Succeed
Common elements to highly effective security champion programs that take DevSecOps to the next level.
How to Secure Your IoT Ecosystem in the Age of 5G
For businesses planning to adopt 5G, the sheer number of IoT devices creates a much larger attack surface.
NEW FROM THE EDGE

C-Level & Studying for the CISSP
One CTO tells us about his belated pursuit of a foundational infosecurity certification -- why he wanted it and what it took.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.