Follow Dark Reading:
 September 28, 2018
LATEST SECURITY NEWS & COMMENTARY
The Cyber Kill Chain Gets A Makeover
A new report demonstrates how the cyber kill chain is consolidating as criminals find ways to accelerate the spread of their targeted cyberattacks.
Google To Let Users Disable Automatic Login to Chrome
The decision comes days after security researcher had blasted company for jeopardizing user privacy with browser update.
Mirai Authors Escape Jail Time - But Here Are 7 Other Criminal Hackers Who Didn't
Courts are getting tougher on the cybercrooks than some might realize.
Think Like An Attacker: How a Red Team Operates
Seasoned red teamers explain the value-add of a red team, how it operates, and how to maximize its effectiveness.
The Human Factor in Social Media Risk
Your employees need help recognizing the warning signs and understanding how to protect themselves online.
Hacking Back: Simply a Bad Idea
While the concept may sound appealing, it's rife with drawbacks and dangers.
Uber Agrees to Pay $148 Million in Nationwide Settlement
Ride-sharing company settles legal cases with 50 states and the District of Columbia for its handling of 2016 data breach.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Dark Web Pricing Trends
For cybercriminals, the Dark Web grows more profitable every day.

Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Actionable advice for tailoring the National Institute of Standards and Technology's security road map to your company's business needs.

The 'Opsec Fail' That Helped Unmask a North Korean State Hacker
How Park Jin Hyok - charged by the US government for alleged computer crimes for the Sony, Bank of Bangladesh, WannaCry cyberattacks - inadvertently blew his cover via email accounts.

MORE
EDITORS' CHOICE

7 Most Prevalent Phishing Subject Lines
The most popular subject lines crafted to trick targets into opening malicious messages, gleaned from thousands of phishing emails.
The Cloud Security Conundrum: Assets vs. Infrastructure
The issue for cloud adopters is no longer where your data sits in AWS, on-premises, Azure, Salesforce, or what have you. The important questions are: Who has access to it, and how is it protected?
Tech Resources
FEATURED REPORTS
  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

  • How Enterprises Are Attacking the IT Security Problem

    Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.