Follow Dark Reading:
 March 21, 2019
LATEST SECURITY NEWS & COMMENTARY
Google Photos Bug Let Criminals Query Friends, Location
The vulnerability, now patched, let attackers query where, when, and with whom victims' photos were taken.
Less Than 3% of Recycled Computing Devices Properly Wiped
Researchers find that companies that refurbish or accept old equipment as donations don't necessarily clean them of data as promised.
Researchers Seek Out Ways to Search IPv6 Space
Security researchers regularly search IPv4 address space looking for servers with ports exposing vulnerable software. With the massive number of IPv6 addresses, however, they have lost that ability. Can tricks and workarounds save the day?
The Insider Threat: It's More Common Than You Think
A new study shows why security teams must look holistically across cybersecurity, compliance, technology, and human resources to truly address the business effects of workforce risk.
TLS 1.3: A Good News/Bad News Scenario
Stronger encryption standards are improving the privacy of data in motion, but enterprises will need to adapt their security architectures to maintain visibility into network traffic.
'Critical' Denial-of-Service Bug Patched in Facebook Fizz
Researchers report a now-patched DoS vulnerability in Facebook Fizz, its open source implementation of the TLS protocol.
BEC Scammer Pleads Guilty
Business email compromise (BEC) operation resulted in $100 million in losses to a multinational technology company and a social media firm, according to the US Attorney's Office.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Low-Cost Security Tools
Security hardware doesn't have to be expensive or complex to do the job. Here are seven examples of low-cost hardware that could fill a need in your security operations.

Proof-of-Concept Tracking System Finds RATs Worldwide
Using a combination of Shodan scans and data from partners, Recorded Future finds nearly 500 malware controllers for 14 different families of remote-access Trojans, as well as the corporate networks they have infected.

Norsk Hydro Shuts Plants Amid Ransomware Attack
The cyberattack, first detected on Monday night, has shut down Norsk's entire global network.

MORE
EDITORS' CHOICE

6 Ways Mature DevOps Teams Are Killing It in Security
New survey shows where "elite" DevOps organizations are better able to incorporate security into application security.
The Case of the Missing Data
The latest twist in the Equifax breach has serious implications for organizations.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Tools & Techniques to Disrupt Lateral Movement

    In this webinar you'll learn about the tools and techniques you can use to detect attackers' lateral movement within your computing environment and how to stop them before they launch their final payload.

  • Practical Cyber Defense for ICS

    In this Dark Reading webinar, top experts offer insight on the threat posed to Industrial control systems (ICS) systems, and how you can expand your security strategies to protect them.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.