Follow Dark Reading:
 November 25, 2019
LATEST SECURITY NEWS & COMMENTARY
Researchers Explore How Mental Health Is Tracked Online
An analysis of popular mental health-related websites revealed a vast number of trackers, many of which are used for targeted advertising.
Black Hat Europe Q&A: Unveiling the Underground World of Anti-Cheats
Security consultant Joel Noguera describes how he got involved in testing anti-cheat software security, and what to expect from his upcoming Black Hat Europe talk.
1.2B Records Exposed in Massive Server Leak
A single server leaked 4 terabytes of personal data, including social media profiles, work histories, and home and mobile phone numbers.
The 5-Step Methodology for Spotting Malicious Bot Activity on Your Network
Bot detection over IP networks isn't easy, but it's becoming a fundamental part of network security practice.
Target Seeks $74M in Data Breach Reimbursement from Insurance Company
The funds would cover some of the money Target paid to reimburse financial institutions for credit card replacement after the 2013 breach.
MORE NEWS & COMMENTARY
HOT TOPICS
Why Multifactor Authentication Is Now a Hacker Target
SIM swaps, insecure web design, phishing, and channel-jacking are four ways attackers are circumventing MFA technology, according to the FBI.

I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
A feature that's supposed to make your account more secure -- adding a cellphone number -- has become a vector of attack in SIM-swapping incidents. Here's how it's done and how you can protect yourself.

Leaks of NSA, CIA Tools Have Leveled Nation-State Cybercriminal Capabilities
The wide availability of tools leaked by the Shadow Brokers and WikiLeaks in 2016 and 2017 have given emerging cyber powers a way to catch up, DarkOwl says.

MORE
EDITORS' CHOICE

6 Top Nontechnical Degrees for Cybersecurity
A computer science degree isn't the only path into a cybersecurity career.
The 'Department of No': Why CISOs Need to Cultivate a Middle Way
A chief information security officer's job inherently involves conflict, but a go-along-to-get-along approach carries its own vulnerabilities and risks.
NEW FROM THE EDGE

When You Know Too Much: Protecting Security Data from Security People
As security tools gather growing amounts of intelligence, experts explain how companies can protect this data from rogue insiders and other threats.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.