Follow Dark Reading:
 August 21, 2018
LATEST SECURITY NEWS & COMMENTARY
The Uncertain Fate of WHOIS, & Other Matters of Internet Accountability
Paul Vixie discusses the uncertain fate of WHOIS in the age of GDPR, the risks of domain name homographs, and other underpinnings of the Internet that are hard to trust and harder to fix.
Real Estate Industry Remains Rich Target for Cybercrime
Trojans, file downloaders, stolen credentials, and BEC scams, hitting the real estate sector.
Google Updates: Cloud HSM Beta, Binary Authorization for Kubernetes
Google's latest cloud security rollouts include early releases of its cloud-hosted security module and a container security tool to verify signed images.
Data Privacy Careers Are Helping to Close the IT Gender Gap
There are three main reasons why the field has been more welcoming for women. Can other tech areas step up?
Augusta University Health Reports Major Data Breach
Over 400K individuals affected by the breach, which was the result of a successful phishing attack that occurred in September 2017.
MORE NEWS & COMMENTARY
HOT TOPICS
Ohio Man Sentenced to 15 Years for BEC Scam
Olumuyiwa Adejumo and co-conspirators targeted CEOs, CFOs, and other enterprise leaders in the US with fraudulent emails.

Social Engineers Show Off Their Tricks
Experts in deception shared tricks of the trade and showed their skills at Black Hat and DEF CON 2018.

Microsoft ADFS Vulnerability Lets Attackers Bypass MFA
The flaw lets an attacker use the same second factor to bypass multifactor authentication for any account on the same ADFS service.

MORE
EDITORS' CHOICE

How Better Intel Can Reduce, Prevent Payment Card Fraud
Royal Bank of Canada machine learning researcher and Terbium Labs chief scientist discuss how they use intelligence about the carding market to predict the next payment card fraud victims.
2018 Pwnie Awards: Who Pwned, Who Got Pwned
A team of security experts round up the best and worst of the year in cybersecurity at Black Hat 2018.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.