Follow Dark Reading:
 December 18, 2018
LATEST SECURITY NEWS & COMMENTARY
Lax Controls Leave Fortune 500 Overexposed On the Net
The largest companies in the world have an average of 500 servers and devices accessible from the Internet - and many leave thousands of systems open to attack.
53 Bugs in 50 Days: Researchers Fuzz Adobe Reader
Automatic vulnerability finding tools detect more than 50 CVEs in Adobe Reader and Adobe Pro during a 50-day experiment.
Disk-Wiping 'Shamoon' Malware Resurfaces With File-Erasing Malware in Tow
As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says.
Cyber Readiness Institute Launches New Program for SMBs
Program seeks to raise employee cyber awareness at small and midsize businesses and give their owners the tools to make a difference.
Facebook: Photo API Bug Exposed 6.8M User Photos
The flaw let developers access images that users may not have shared publicly, including those they started to upload but didn't post.
Chinese Hackers Stole Classified US Navy Info
Cyberattacks reportedly targeted US Defense contractor.
MORE NEWS & COMMENTARY
HOT TOPICS
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Constant learning is a requirement for cybersecurity professionals. Here are 15 books recommended by professionals to continue a professional's education.

Worst Password Blunders of 2018 Hit Organizations East and West
Good password practices remain elusive as Dashlane's latest list of the worst password blunders can attest.

Attackers Using New Exploit Kit to Hijack Home & Small Office Routers
Goal is to steal banking credentials by redirecting users to phishing sites.

MORE
EDITORS' CHOICE

2019 Attacker Playbook
Security pundits predict the ways that cybercriminals, nation-state actors, and other attackers will refine their tactics, techniques, and procedures in the coming year.
Shhhhh! The Secret to Secrets Management
Companies need to take a centralized approach to protecting confidential data and assets. Here are 12 ways to get a handle on the problem.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Stopping Email-Borne Threats from Spreading like the Flu

    Your organization likely has extensive security protections for your inbound email from the Internet. However, as much as two-thirds of many organizations' total email traffic is generated internally by users. And, of course, attackers know this.

  • Choosing the Right Strategies for Endpoint Security

    In this webinar, experts will discuss methods for rationalizing endpoint protection tools and strategies and building a comprehensive strategy that works across the entire organization.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.