Follow Dark Reading:
 April 12, 2019
LATEST SECURITY NEWS & COMMENTARY
Tax Hacks: How Seasonal Scams Cause Yearlong Problems
Tax season is marked with malware campaigns, tax fraud, and identity theft, with money and data flowing through an underground economy.
'Dragonblood' Vulnerabilities Seep Into WPA3 Secure Wifi Handshake
A new set of vulnerabilities may put some early adopters of strong Wifi security at greater security risk.
New 'HOPLIGHT' Malware Appears in Latest North Korean Attacks, Say DHS, FBI
The FBI and Department of Homeland Security release malware analysis report, indicators of compromise for nine different executable files.
Julian Assange Arrested in London
The WikiLeaks founder, who was taken from the Ecuadorian Embassy by British police, has been convicted of skipping bail in 2012.
In Security, All Logs Are Not Created Equal
Prioritizing key log sources goes a long way toward effective incident response.
Microsoft Patches Are Freezing Older PCs Running Sophos, Avast
Computers running Sophos or Avast software have been failing to boot following the latest Patch Tuesday update.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Essential Skills Cybersecurity Pros Need to Develop in 2019
In a time of disruption in the security and tech worlds, cybersecurity professionals can't afford to become complacent - even in the face of a skills shortage.

Phishing Campaign Targeting Verizon Mobile Users
Lookout Phishing AI, which discovered the attack, says it has been going on since late November.

Credential-Stuffing Attacks Behind 30 Billion Login Attempts in 2018
Using e-mail addresses and passwords from compromised sites, attackers most often targeted retail sites, video-streaming services, and entertainment companies, according to Akamai.

MORE
EDITORS' CHOICE

8 Steps to More Effective Small Business Security
Small business face the same security challenges as large enterprises but with much smaller security teams. Here are 8 things to do to get the most from yours.
When Your Sandbox Fails
The sandbox is an important piece of the security stack, but an organization's entire strategy shouldn't rely on its ability to detect every threat. Here's why.

Interop 2019 Security Pro Summit

If you're an experienced security professional looking for advanced education, the all-day Security Pro Summit produced by the editors of Dark Reading provides a deep dive into cybersecurity threats and the latest methods for detecting and responding to them. Tuesday, May 21. Register today!


Tech Resources
ACCESS TECH LIBRARY NOW

  • End-User Security Awareness Programs That Work

    Imagine your users could be the security department's eyes and ears--the first to alert you to a potential threat. In this webinar learn how to create an end-user security awareness program that engages your users, builds a security culture, and ...

  • Secure Email: Developing the Right Strategy

    In this webinar, top experts discuss strategies for limiting access to critical email systems, when to encrypt email attachments and transmissions, and how to build a day-to-day process for protecting email against common cyber attacks.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • Managing the Risk of Post-breach or Resident Attacks

    How well-equipped is your organization to stop insider attacks or external attackers once they're inside your network? According to this study, almost two-thirds of respondents lack efficient capabilities to detect and investigate "stealth" attackers before serious damage occurs.

  • Online Malware & Threats: A Profile of Today's Security Posture

    This Dark Reading report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.