Follow Dark Reading:
 April 11, 2019
LATEST SECURITY NEWS & COMMENTARY
Triton/Trisis Attacks Another Victim
FireEye Mandiant incident responders reveal a new attack by the hacking group that previously targeted a petrochemical plant in Saudi Arabia in 2017.
25% of Phishing Emails Sneak into Office 365: Report
Researchers analyzed 55.5 million emails and found one out of every 99 messages contains a phishing attack.
Majority of Hotel Websites Leak Guest Booking Info
Third parties such as ad, search engine, and analytics firms often have access to guest name, address, phone numbers, credit cards and other data, Symantec says.
Android Phones Now Double as Physical Security Keys
Google debuted a series of security updates at Next 2019, giving users the option to use their phone as a second authentication factor.
New Android Malware Adds Persistence, Targets Australian Banking Customers
Malware campaign, which finds and exfiltrates a user's contact list and banking credentials, could potentially grow to global proportions.
Safe Harbor Programs: Ensuring the Bounty Isn't on White Hat Hackers' Heads
As crowdsourced security-testing surges in popularity, companies need to implement safe harbor provisions to protect good-faith hackers -- and themselves.
Senate Bill Would Ban Social Networks' Social Engineering Tricks
Bill takes aim at tactics used to convince people to give up their personal data, designing games that addict kids, and more.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Essential Skills Cybersecurity Pros Need to Develop in 2019
In a time of disruption in the security and tech worlds, cybersecurity professionals can't afford to become complacent - even in the face of a skills shortage.

Phishing Campaign Targeting Verizon Mobile Users
Lookout Phishing AI, which discovered the attack, says it has been going on since late November.

Credential-Stuffing Attacks Behind 30 Billion Login Attempts in 2018
Using e-mail addresses and passwords from compromised sites, attackers most often targeted retail sites, video-streaming services, and entertainment companies, according to Akamai.

MORE
EDITOR'S CHOICE

8 Steps to More Effective Small Business Security
Small business face the same security challenges as large enterprises but with much smaller security teams. Here are 8 things to do to get the most from yours.
Merging Companies, Merging Clouds
Integrating cloud environments is anything but easy. Evaluating the security risks in doing so must be a starting component of an overall M&A strategy.
Tech Resources
ACCESS TECH LIBRARY NOW

  • End-User Security Awareness Programs That Work

    Imagine your users could be the security department's eyes and ears--the first to alert you to a potential threat. In this webinar learn how to create an end-user security awareness program that engages your users, builds a security culture, and ...

  • Building an Incident Readiness & Response Playbook

    Don't make a data breach any harder than it needs to be. In this webinar, learn the Xs and Os of any good security incident readiness and response playbook.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.