Follow Dark Reading:
 August 28, 2017
LATEST SECURITY NEWS & COMMENTARY
Turning Sound Into Keystrokes: Skype & Type
Don't let your fingers do the talking in a Skype session. The callers on the other end could know what you're writing, researcher Daniele Lain explains.
Chinese National with Possible Links to OPM Breach Arrested
Charging documents reveal sophistication - and a surprising degree of sloppiness.
Why You Need to Study Nation-State Attacks
Want to know what attacks against businesses will look like soon? Examine nation-state attacks now.
A Call for New Voices on the Security Conference Circuit
If the mere idea of talking in public makes you want to hide in a bathroom stall with a stuffed bobcat, think again.
New Targeted Ransomware Hits Healthcare, Manufacturing
A new ransomware strain, Defray, that focuses on certain verticals in narrow and select attacks is making the rounds in the healthcare, education, manufacturing, and technology sectors.
MORE NEWS & COMMENTARY
HOT TOPICS
Apple iOS Exploit Takes Complete Control of Kernel
Researcher demonstrates 'severe' ZIVA exploit at Hack in the Box.

ROPEMAKER Attack Turns Benign Emails Hostile Post-Delivery
The intersection of email and Web technologies has given attackers a way to mess with your email after it has been delivered to your inbox, Mimecast says.

Google Removes 500 Android Apps Following Spyware Scare
Android apps embedded with an advertising software development kit removed after researchers discover its potential for stealing users' caller data.

MORE
IN CASE YOU MISSED IT

GoT & the Inside Threat: Compromised Insiders Make Powerful Adversaries
What Game of Thrones' Arya Stark and the Faceless Men can teach security pros about defending against modern malware and identity theft.
Tech Resources
ACCESS TECH LIBRARY NOW

  • What You Need to Know about GDPR

    GDRP is an acronym that stands for General Data Protection Regulation and it's designed to give control of personal data back to individuals and take it out of the hands of the companies that collect it for commercial use. It ...

  • Finding and Fixing Application Security Vulnerabilities

    Hear from a top applications security expert as he discusses key practices for scanning and securing applications and offers some insight on how to improve security in your software development organization.

MORE WEBINARS

Partner Perspectives

Continuous Compliance and Effective Audit Preparation for the Cloud
Why audits are a necessary evil, and how they can actually help you improve your brand value.

How Quantum Computing Will Change Browser Encryption
From a protocol point of view, we're closer to a large-scale quantum computer than many people think. Here's why that's an important milestone.

Ransomware: The Tripflare in the Modern Cyberwar
With the frequency and scale of breaches on the rise, and our legacy security failing to protect us, is ransomware the catalyst we need to trigger improvement in our security postures?

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.