Follow Dark Reading:
 September 11, 2019
LATEST SECURITY NEWS & COMMENTARY
New Privacy Features in iOS 13 Let Users Limit Location Tracking
Apple will introduce other features that allow more secure use of iPhones in workplace settings as well.
Two Zero-Days Fixed in Microsoft Patch Rollout
September's Patch Tuesday addressed 80 vulnerabilities, two of which have already been exploited in the wild.
AI Is Everywhere, but Don't Ignore the Basics
Artificial intelligence is no substitute for common sense, and it works best in combination with conventional cybersecurity technology. Here are the basic requirements and best practices you need to know.
Data Is the New Copper
Data breaches fuel a complex cybercriminal ecosystem, similar to copper thefts after the financial crisis.
US Power Grid Cyberattack Due to Unpatched Firewall: NERC
A firewall vulnerability enabled attackers to repeatedly reboot the victim entity's firewalls, causing unexpected outages.
Third-Party Features Leave Websites More Vulnerable to Attack
A new report points out the dangers to customer data of website reliance on multiple third parties.
MORE NEWS & COMMENTARY
HOT TOPICS
New Technique Makes Passwords 14M Percent Harder to Crack, Nonprofit Claims
Tide's method for protecting passwords splinters them up into tiny pieces and stores them on distributed nodes.

Meet FPGA: The Tiny, Powerful, Hackable Bit of Silicon at the Heart of IoT
Field-programmable gate arrays are flexible, agile-friendly components that populate many infrastructure and IoT devices - and have recently become the targets of researchers finding vulnerabilities.

Chinese Group Built Advanced Trojan by Reverse Engineering NSA Attack Tool
APT3 quietly monitored an NSA attack on its systems and used the information to build a weapon of its own.

MORE
EDITORS' CHOICE

7 Steps to Web App Security
Emerging technologies are introducing entirely new ways to reach, act, and interact with people. That makes app security more important than ever.
NEW FROM THE EDGE

Security Pros' Painless Guide to Machine Intelligence, AI, ML & DL
Artificial intelligence, machine learning, or deep learning? Knowing what the major terms really mean will help you sort through the morass of words on the subject and the security uses of each.
What Are the First Signs of a Cloud Data Leak?
Most cloud data breaches leave only trace signs of malfeasance, so it can be tricky.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE

DARK READING TECH DIGEST

Dark Reading examines the research revealed at Black Hat USA and takes a look at some of the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.

DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.