Follow Dark Reading:
 November 02, 2017
LATEST SECURITY NEWS & COMMENTARY
'Silence' Trojan Mimics Carbanak to Spy, Steal from Banks
Attackers break into financial organizations and stay there to record employees' activities, steal data, and use it to steal, similar to the Carbanak group.
Average Employee Manages Nearly 200 Passwords
But single sign-on support lacks in over 50% of the most popular websites and services used by workers.
How Wireless Intruders Can Bypass NAC Controls
A researcher at this month's SecTor conference will demonstrate the dangers of not employing EAP-TLS wireless security.
Will New Ownership Open New Opportunities for Digital Cert Vendors?
Francisco Partners acquires majority stake in Comodo CA; DigiCert completes purchase of Symantec's SSL cert business.
How AI Can Help Prevent Data Breaches in 2018 and Beyond
Artificial intelligence startups are tackling four key areas that will help companies avoid becoming the next Equifax.
iPhone 7, Samsung Galaxy S8, Others Hacked in Pwn2Own
Researchers participating in the Mobile Pwn2Own 2017 competition developed exploits for the iPhone 7, Samsung Galaxy S8, and others.
MORE NEWS & COMMENTARY
HOT TOPICS
Office 365 Missed 34,000 Phishing Emails Last Month
Nearly 10% of emails delivered to Office 365 inboxes were spam, phishing messages, and known or zero-day malware.

Security Gets Social: 10 of Dark Reading's Most Shared Stories
We scared up our most popular stories on Facebook, Twitter, and LinkedIn

A Checklist for Securing the Internet of Things
IoT devices promise endless benefits, but they also come with serious security issues. Use this checklist to make sure your company stays safe.

MORE
EDITORS' CHOICE

How to Make a Ransomware Payment - Fast
Paying ransom in a ransomware attack isn't recommended, but sometimes, it's necessary. Here's how to pay by cryptocurrency.
Who Says Brilliant Security Engineers Can't Be Amazing People Managers?
Don't let mid-career stagnation be an exit ramp from the cybersecurity industry. Use it as an opportunity to explore, and to deepen your enthusiasm.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Ransomware: Trends, Use Cases & Protection

    Ransomware is one of the favorite flavors of malware and is particularly vicious and showing no signs of slowing down. Join this webinar as Senior Security Researcher Kyle Wilhoit helps us to understand ransomware trends, ransomware use cases, the financial ...

  • Security Implications of VoIP & SIP

    This webinar will examine the security implications of using VoIP and SIP, how to best protect real-time communications traffic with tools you already have as well as with new tools, and how to orchestrate protections to prevent UC security from ...

MORE WEBINARS

Partner Perspectives

5 Reasons Why the CISO is a Cryptocurrency Skeptic
If you think all you need is technology to defend against bad guys, you shouldn't be a CISO. But technology is all cryptocurrency is, starting with Bitcoin.

CISOs: Striving Toward Proactive Security Strategies
A new survey paints a compelling picture of the modern security executive, how they succeed, and how much power they wield.

6 Steps to Finding Honey in the OWASP
The most famous project of the Open Web Application Security Project is getting an update. Here's what you need to know, and how you can get involved.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.