Dark Reading

Intel Expands Bug Bounty Program, Offers up to $250K

02/14/2018
Microprocessor giant adds vulnerability-finding category for Meltdown, Spectre-type flaws.

3 Tips to Keep Cybersecurity Front & Center

02/14/2018
In today's environment, a focus on cybersecurity isn't a luxury. It's a necessity, and making sure that focus is achieved starts with the company's culture.

Cybercrime Costs for Financial Sector up 40% Since 2014

02/14/2018
A 9.6% increase just in the past year, and denial-of-service attacks are partly to blame.

Encrypted Attacks Continue to Dog Perimeter Defenses

02/14/2018
Attacks using SSL to obfuscate malicious traffic finding fertile ground for growth.

Fileless Malware: Not Just a Threat, but a Super-Threat

02/14/2018
Exploits are getting more sophisticated by the day, and cybersecurity technology just isn't keeping up.

The GDPR Clock Is Running Out. Now What?

02/14/2018
Many organizations impacted by new European Union data privacy rules that go into effect May 25 are still blind to some of the basics.

AI and Machine Learning: Breaking Down Buzzwords

02/13/2018
Security experts explain two of today's trendiest technologies to explain what they mean and where you need them.

As Primaries Loom, Election Security Efforts Behind Schedule

02/13/2018
While federal agencies lag on vulnerability assessments and security clearance requests, the bipartisan Defending Digital Democracy Project releases three new resources to help state and local election agencies with cybersecurity, incident response.

Microsoft Fixes Two Security Flaws in Outlook

02/13/2018
February security patches include updates for 50 vulnerabilities, 14 of which are critical.

Lazarus Group Attacks Banks, Bitcoin Users in New Campaign

02/13/2018
A new Lazarus Group cyberattack campaign combines spear-phishing techniques with a cryptocurrency scanner designed to scan for Bitcoin wallets.

Can Android for Work Redefine Enterprise Mobile Security?

02/13/2018
Google's new mobility management framework makes great strides in addressing security and device management concerns while offering diverse deployment options. Here are the pros and cons.

Fake News: Could the Next Major Cyberattack Cause a Cyberwar?

02/13/2018
In the way it undercuts trust, fake news is a form of cyberattack. Governments must work to stop it.

Equifax Names New CISO

02/13/2018
Former Home Depot CISO takes the reins in the wake of Equifax's massive data breach and fallout.

Cyberattack Aimed to Disrupt Opening of Winter Olympics

02/12/2018
Researchers who identified malware targeting the 2018 Winter Olympics say the attackers had previously compromised the Games' infrastructure.

Attackers Use Infected Plug-In to Install Cryptomining Tool on Over 4200 Websites

02/12/2018
Victims include UK's ICO, and National Health Service and USCourts.gov.

One in Three SOC Analysts Now Job-Hunting

02/12/2018
The more experienced a SOC analyst gets, the more his or her job satisfaction declines, a new survey of security operations center staffers shows.