Follow Dark Reading:
 July 25, 2017
LATEST SECURITY NEWS & COMMENTARY
Voter Registration Data from 9 States Available for Sale on Dark Web
Nearly 10 million voter records sold for just $4 over last few days, according to LookingGlass Cyber Solutions.
Weather.com, Fusion Expose Data Via Google Groups Config Error
Companies that leaked data accidentally chose the sharing setting "public on the Internet," which enabled anyone on the Web to access all information contained in the messages
Bots Make Lousy Dates, But Not Cheap Ones
The danger of dating sites: If a beautiful woman asks men to click on malware, they'll probably click.
Majority of Security Pros Let Productivity Trump Security
A survey found that 64% of IT security professionals will tweak security to give workers more flexibility to be productive when asked to make that move by top executives.
Custom Source Code Accounts for 93% of App Vulnerabilities
A new study finds that third-party libraries account for 79% of the code found in apps, but only 7% of the vulnerabilities found in the software.
Regulators Question Wells Fargo Regarding Data Breach
Scrutiny a result of a lawyer's unauthorized release of sensitive information on tens of thousands of wealthy Well Fargo customers.
MORE NEWS & COMMENTARY
HOT TOPICS
Best of Black Hat: 20 Epic Talks in 20 Years
In celebration of Black Hat's 20th birthday, we take a look back at the most memorable presentations and demos since the show's inception in 1997.

Microsoft Rolls Out AI-based Security Risk Detection Tool
Microsoft Security Risk Detection leverages artificial intelligence to root out bugs in software before it's released.

Apple iOS Malware Growth Outpaces that of Android
Number of iOS devices running malicious apps more than tripled in three consecutive quarters, while infected Android devices remained largely flat, report shows.

MORE
EDITORS' CHOICE

7 Hardware & Firmware Hacks Highlighted at Black Hat 2017
Researchers will hammer home potentially devastating attacks, and demo a range of vulnerabilities, techniques and tools.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Useing Threat Data to Improve Your Cyber Defense

    Attend this webinar to learn how you can determine which threats pose the greatest danger to your enterprise, and how to analyze threat data and use it to help improve your organization's cyber defense.

  • The Real Impact of a Data Security Breach

    In this webcast, experts discuss the real losses associated with a breach, both in the data center and in the business and how an effective data breach response program can help mitigate the damage.

MORE WEBINARS

Partner Perspectives

Profile of a Hacker: The Real Sabu
There are multiple stories about how the capture of the infamous Anonymous leader Sabu went down. Here's one, and another about what he is doing today.

The Hunt for Networks Building Death Star-Sized Botnets
Internet of Things devices are more critically vulnerable to compromise in DDos attacks than ever before. Here's how to defend against them.

Securing your Cloud Stack from Ransomware
Poor configuration, lack of policies, and permissive behaviors are three factors that can leave your cloud infrastructure vulnerable to ransomware threats.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.