Dark Reading

Criminals Hide Fraud Behind the Green Lock Icon

12/09/2019
Criminals are using free certificate services to apply real security certs to fraudulent sites - and to take advantage of victims looking for surfing safety.

How Attackers Used Look-Alike Domains to Steal $1 Million From a Chinese VC

12/06/2019
Money meant to fund an Israeli startup wound up directly deposited to the scammers.

Data Center Provider CyrusOne Confirms Ransomware Attack

12/06/2019
The attack struck CyrusOne's managed services division and compromised six customers primarily serviced by a New York data center.

Senators Call for End to Controversial NSA Program

12/06/2019
The program for collecting telephone call metadata has faced increased scrutiny and restrictions since Edward Snowden revealed its existence in 2013.

Mega Breaches Are Forcing Us to a Passwordless World. Are We Finally Ready?

12/06/2019
Passwordless authentication advocates see 2020 as a potential turning point year for the technology. But can the industry get off the dime?

Success Enablers or Silent Killers?

12/06/2019
These five success enablers will help CISOs report, measure, and demonstrate ROI to the C-suite.

VPN Flaw Allows Criminal Access to Everything on Victims' Computers

12/05/2019
Vulnerability in the Aviatrix VPN client, since patched, gives an attacker unlimited access to a breached system.

US Sets $5 Million Bounty For Russian Hacker Behind Zeus Banking Thefts

12/05/2019
Maksim Yakubets and his crew stole tens of millions using Zeus and Dridex, with victims including Bank of America, Key Bank, GenLabs, and United Dairy, DoJ says.

With Aporeto, Palo Alto Looks Away from the Firewall and Toward the Future

12/05/2019
Seeing its firewall sales softening, the security vendor makes another acquisition to reorient itself for the cloud era.

10 Security 'Chestnuts' We Should Roast Over the Open Fire

12/05/2019
These outdated security rules we all know (and maybe live by) no longer apply.

SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit

12/05/2019
Assessments can be used against your company in court proceedings. Here's how to mitigate this potential risk.

Microsoft Defender ATP Brings EDR Capabilities to macOS

12/05/2019
Mac computers will now have the option to use Microsoft Defender Advanced Threat Protection's endpoint and detection response.

The Human Factor: 5 Reasons Why Cybersecurity Is a People Problem

12/05/2019
The industry can only go so far in treating security as a challenge that can be resolved only by engineering.

Black Hat Europe Q&A: Understanding the Ethics of Cybersecurity Journalism

12/04/2019
Investigative journalist Geoff White chats about why now is the right time for his Black Hat Europe Briefing on hackers, journalists, and the ethical ramifications of cybersecurity journalism.

Shades of Shamoon: New Disk-Wiping Malware Targets Middle East Orgs

12/04/2019
'ZeroCleare' shares some of the same features as its more notorious predecessor, IBM Security says.

(Literally) Put a Ring on It: Protecting Biometric Fingerprints

12/04/2019
Kaspersky creates a prototype ring you can wear on your finger for authentication.

The Edge Cartoon Contest: You Better Watch Out ...

12/04/2019
Feeling creative this holiday season? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

Navigating Security in the Cloud

12/04/2019
Underestimating the security changes that need to accompany a shift to the cloud could be fatal to a business. Here's why.

Microsoft Issues Advisory for Windows Hello for Business

12/04/2019
An issue exists in Windows Hello for Business when public keys persist after a device is removed from Active Directory, if the AD exists, Microsoft reports.

Attackers Continue to Exploit Outlook Home Page Flaw

12/04/2019
FireEye issues guidance on locking down Outlook, claiming that security researchers, at least, are able to work around the patch issued by Microsoft.