Follow Dark Reading:
 August 01, 2019
LATEST SECURITY NEWS & COMMENTARY
Sextortion Email Scams Rise Sharply
Cybercriminals are increasingly trying to trick people into paying ransoms by threatening to expose compromising activities to friends and family.
Android Spyware Has Ties to Election Interference
Recently revealed surveillance-ware comes from a consultant with close ties to Russia's GRU who was sanctioned by the US for election-tampering.
Capital One Breach Affects 100M US Citizens, 6M Canadians
The breach exposed credit card application data, Social Security numbers, and linked bank accounts, among other information.
Former Twitter CISO Launches Startup to Secure Cloud Collaboration
Altitude Networks, led by Michael Coates and Amir Kavousian, aims to prevent accidental and malicious file sharing.
3 Takeaways from the First American Financial Breach
Data leaks from business logic flaws are not well understood and difficult to identify before they reach production environments. Here's how to find and prevent them.
Transforming 'Tangible Security' into a Competitive Advantage
Today's consumers want to see and touch security. Meeting this demand will be a win-win for everyone, from users to vendors to security teams.
MORE NEWS & COMMENTARY
HOT TOPICS
Companies' 'Anonymized' Data May Violate GDPR, Privacy Regs
New study found that any database containing 15 pieces of demographic data could be used to identify individuals.

What Every Security Team Should Know About Internet Threats
Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.

4 Network Security Mistakes Bound to Bite You
It's Shark Week again! Are you ready to outmaneuver sharks of the cyber variety? These tips can help.

MORE
EDITORS' CHOICE

8 Free Tools to Be Showcased at Black Hat and DEF CON
Expect a full slate of enterprise-class open source tools to take the spotlight when security researchers share their bounties with the community at large.
The Attribution Trap: A Waste of Precious Time & Money
Aiming for attribution doesn't help most organizations become more secure. It can actually have the opposite effect.
NEW FROM THE EDGE

Keep Your Eye on Digital Certificates
X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
  • [Malware Threats Survey] Do you have 10 mins to spare?

    Dark Reading needs your help with this 10-minute survey. Complete the survey and you can enter to win one of five $50 Amazon gift cards!

  • State of the Cloud

    This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.