Follow Dark Reading:
 November 26, 2019
LATEST SECURITY NEWS & COMMENTARY
Tushu, Take Twoshu: Malicious SDK Reappears in Google Play
Months after the Tushu SDK was found infecting Android apps on Google Play, its operators are back with new evasive techniques.
Most Organizations Have Incomplete Vulnerability Information
Companies that rely solely on CVE/NVD are missing 33% of disclosed flaws, Risk Based Security says.
Time to Warn Users About Black Friday & Cyber Monday Scams
Warn your employees to avoid the inevitable scams associated with these two "holidays," or you risk compromising your company's network.
T-Mobile Prepaid Hit by Significant Data Breach
The breach, estimated to have affected more than a million customers, came from malicious external actors.
They See You When You're Shopping: Holiday Cybercrime Starts Early
Researchers notice year-end phishing attacks starting in July and ramping up in September.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Top Nontechnical Degrees for Cybersecurity
A computer science degree isn't the only path into a cybersecurity career.

Why Multifactor Authentication Is Now a Hacker Target
SIM swaps, insecure web design, phishing, and channel-jacking are four ways attackers are circumventing MFA technology, according to the FBI.

Anatomy of a BEC Scam
A look at the characteristics of real-world business email compromise attacks - and what makes them tick.

MORE
EDITORS' CHOICE

Home Safe: 20 Cybersecurity Tips for Your Remote Workers
How can you protect your precious corporate endpoints from the mysterious dangers that might await when you're not by their side? Empower home office users with these tips.
A Security Strategy That Centers on Humans, Not Bugs
The industry's fixation on complex exploits has come at the expense of making fundamentals easy and intuitive for end users.
NEW FROM THE EDGE

The Edge Cartoon Contest: Need a Lift?

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Enterprise IoT: Rise of the Unmanaged Devices

    Join the leading enterprise IoT security company, along with IBM Security Services, to see real-life scenarios of these new unmanaged devices - from enterprise to healthcare to manufacturing.

  • Defeating Advanced Adversaries with Tactical Analytics

    In this webinar, you will be provided with a clear and technical plan on how to transition to SOC 3.0 and, most importantly, on how to establish a tactical analytics capability to effectively detect and defeat advanced adversaries.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.