Follow Dark Reading:
 September 14, 2017
LATEST SECURITY NEWS & COMMENTARY
Equifax Gets Slammed, Removes Forced Arbitration Clause from Credit Monitoring Offer
Company's initial requirement that breach victims sign away their legal rights to get complimentary offer was one of several mistakes.
Microsoft: Ransomware Decline Reversed in March 2017
Researchers discovered 71 new ransomware families in the first half of 2017, when attacks picked up after several months of decline.
Why Relaxing Our Password Policies Might Actually Bolster User Safety
Recent guidance from NIST may seem counterintuitive.
10 Ways to Prevent Your Mobile Devices From Becoming Bots
Enterprises may not notice a huge impact on their network's bandwidth, but other repercussions may loom in the background.
Deception: A Convincing New Approach to Cyber Defense
How defenders in a US national security agency capture-the-flag exercise used an endless stream of false data across the network to thwart attackers and contain damage.
Billions Of Bluetooth Devices Vulnerable To Code Execution, MITM Attacks
IoT security vendor Armis this week disclosed a total of 8 zero-day bugs in Bluetooth implementations in Android, Windows, Linux, and IOS.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Tips to Fight Gmail Phishing Attacks
Popular email platforms like Gmail are prime phishing targets. Admins can adopt these steps to keep attackers at bay.

If Blockchain Is the Answer, What Is the Security Question?
Like any technology, blockchain has its strengths and weaknesses. But debunking three common myths can help you cut through the hype.

New Microsoft Kernel Bug Could Permit Malicious Modules
Researchers found a Microsoft kernel bug that could allow attackers to bypass antivirus systems and load malware.

MORE
EDITORS' CHOICE

7 Takeaways From The Equifax Data Breach
The exposure of PII belonging to 143 million US consumers raises questions about the continued use of SSNs as identifiers, breach liability and app sec spending.
VIDEO FROM THE DR NEWS DESK

By SARA PETERS Senior Editor at Dark Reading

Tesla Hacks: The Good, The Bad, & The Ugly
Keen Security Lab found multiple holes in the isolation layer Tesla uses to protect drive systems from infotainment systems, but were impressed by the auto company's security in other ways.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.