Follow Dark Reading:
 February 14, 2019
LATEST SECURITY NEWS & COMMENTARY
Scammers Fall in Love with Valentine's Day
Online dating profiles and social media accounts add to the rich data sources that allow criminals to tailor attacks.
2018 Was Second-Most Active Year for Data Breaches
Hacking by external actors caused most breaches, but Web intrusions and exposures compromised more records, according to Risk Based Security.
Ex-US Intel Officer Charged with Helping Iran Target Her Former Colleagues
Monica Witt, former Air Force and counterintel agent, has been indicted for conspiracy activities with Iranian government, hackers.
70% of Consumers Want Biometrics in the Workplace
Speed, simplicity, and security underscore their desire, a new study shows.
Windows Executable Masks Mac Malware
A new strain of MacOS malware hides inside a Windows executable to avoid detection.
Researchers Dig into Microsoft Office Functionality Flaws
An ongoing study investigating security bugs in Microsoft Office has so far led to two security patches.
5 Expert Tips for Complying with the New PCI Software Security Framework
The Secure SLC Standard improves business efficiency for payment application vendors but could also stand as new security benchmark for other industries to follow.
MORE NEWS & COMMENTARY
HOT TOPICS
Ransomware Attack Via MSP Locks Customers Out of Systems
Vulnerable plugin for a remote management tool gave attackers a way to encrypt systems belonging to all customers of a US-based MSP.

Devastating Cyberattack on Email Provider Destroys 18 Years of Data
All data belonging to US users-including backup copies-have been deleted in catastrophe, VMEmail says.

New Zombie 'POODLE' Attack Bred from TLS Flaw
Citrix issues update for encryption weakness dogging the popular security protocol.

MORE
EDITORS' CHOICE

2019 Security Spending Outlook
Cybersecurity and IT risk budgets continue to grow. Here's how they'll be spent.
Lessons Learned from a Hard-Hitting Security Review
Information security is a corporate posture and must be managed at all levels: systems, software, personnel, and all the key processes.
Tech Resources
ACCESS TECH LIBRARY NOW

  • 10 Emerging Enterprise App Threats

    Hear as application security experts offer a look at the latest and most potentially damaging threats to current enterprise apps, and how those threats can expose your organization to data compromise and theft.

  • Choosing the Right Strategies for Endpoint Security

    In this webinar, experts will discuss methods for rationalizing endpoint protection tools and strategies and building a comprehensive strategy that works across the entire organization.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • How Enterprises Are Attacking the Cybersecurity Problem

    Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations ...

  • 2018 State of the Cloud Report

    Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.