Follow Dark Reading:
 February 10, 2020
LATEST SECURITY NEWS & COMMENTARY
RobbinHood Kills Security Processes Before Dropping Ransomware
Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files.
5 Measures to Harden Election Technology
Voting machinery needs hardware-level security. The stakes are the ultimate, and the attackers among the world's most capable.
CCPA and GDPR: The Data Center Pitfalls of the 'Right to be Forgotten'
Compliance with the new privacy rules doesn't always fall on data center managers, but when it does, it's more difficult than it may sound.
7 Ways SMBs Can Secure Their Websites
Here's what small and midsize businesses should consider when they decide it's time to up their website security.
Google Takeout Serves Up Video Files to Strangers
A limited number of user videos were shared with others in a five-day incident from November.
MORE NEWS & COMMENTARY
HOT TOPICS
C-Level & Studying for the CISSP
One CTO tells us about his belated pursuit of a foundational infosecurity certification -- why he wanted it and what it took.

Kubernetes Shows Built-in Weakness
A Shmoocon presentation points out several weaknesses built in to Kubernetes configurations and how a researcher can exploit them.

Cybersecurity Vendor Landscape Transforming as Symantec, McAfee Enter New Eras
Two years ago, Symantec and McAfee were both primed for a comeback. Today, both face big questions about their future.

MORE
EDITORS' CHOICE

RSAC Sets Finalists for Innovation Sandbox
The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year.
How Device-Aware 2FA Can Defeat Social Engineering Attacks
While device-aware two-factor authentication is no panacea, it is more secure than conventional SMS-based 2FA. Here's why.
NEW FROM THE EDGE

From 1s & 0s to Wobbly Lines: The Radio Frequency (RF) Security Starter Guide
Although radio frequency energy (RF) communications are increasingly essential to modern wireless networking and IoT, the security of RF is notoriously lax.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.