Follow Dark Reading:
 July 26, 2017
LATEST SECURITY NEWS & COMMENTARY
Using AI to Break Detection Models
Pitting machine learning bots against one another is the new spy vs. spy battle in cybersecurity today.
Iranian Cyber Espionage Group CopyKittens Are Successful, But Not Skilled
Despite being only moderately skilled, CopyKittens has exfiltrated large volumes of data since at least 2013.
How 'Postcript' Exploits Networked Printers
At Black Hat 2017, a university researcher will demo how attackers can drill into networked printers by way of the ubiquitous PostScript programming language.
Custom Source Code Accounts for 93% of App Vulnerabilities
A new study finds that third-party libraries account for 79% of the code found in apps, but only 7% of the vulnerabilities found in the software.
How Women Can Raise Their Profile within the Cybersecurity Industry
Closing the cybersecurity gender gap won't happen overnight, but women can take can take steps to begin leveling the playing field.
Regulators Question Wells Fargo Regarding Data Breach
Scrutiny a result of a lawyer's unauthorized release of sensitive information on tens of thousands of wealthy Well Fargo customers.
MORE NEWS & COMMENTARY
HOT TOPICS
Voter Registration Data from 9 States Available for Sale on Dark Web
Nearly 10 million voter records sold for just $4 over last few days, according to LookingGlass Cyber Solutions.

Best of Black Hat: 20 Epic Talks in 20 Years
In celebration of Black Hat's 20th birthday, we take a look back at the most memorable presentations and demos since the show's inception in 1997.

Microsoft Rolls Out AI-based Security Risk Detection Tool
Microsoft Security Risk Detection leverages artificial intelligence to root out bugs in software before it's released.

MORE
EDITORS' CHOICE

7 Hardware & Firmware Hacks Highlighted at Black Hat 2017
Researchers will hammer home potentially devastating attacks, and demo a range of vulnerabilities, techniques and tools.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Best Practices] Managing Multiple Clouds

    Putting all your eggs in one cloud basket is risky, because clouds are not immune to denials of service, nor are they immune to going out of business. Using multiple clouds with multiple vendors is a good idea, but managing ...

  • The Real Impact of a Data Security Breach

    In this webcast, experts discuss the real losses associated with a breach, both in the data center and in the business and how an effective data breach response program can help mitigate the damage.

MORE WEBINARS

Partner Perspectives

Lessons from Verizon: Managing Cloud Security for Partners
The recent Verizon breach - data exposed by an insecure Amazon S3 bucket - highlights the need for enterprises to have visibility into how partners and other stakeholders keep their data secure.

Profile of a Hacker: The Real Sabu
There are multiple stories about how the capture of the infamous Anonymous leader Sabu went down. Here's one, and another about what he is doing today.

The Hunt for Networks Building Death Star-Sized Botnets
Internet of Things devices are more critically vulnerable to compromise in DDos attacks than ever before. Here's how to defend against them.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.