
Latest News
While most US adults know they aren't sufficiently protecting their data online, many find security time-consuming or don't know the steps they should take.
While most US adults know they aren't sufficiently protecting their data online, many find security time-consuming or don't know the steps they should take.
The attack targets Android devices and starts with a malicious SMS message that aims to bring malware onto compromised devices.
The attack targets Android devices and starts with a malicious SMS message that aims to bring malware onto compromised devices.
A vast majority of security professionals surveyed think any exploit will start with the endpoint.
A vast majority of security professionals surveyed think any exploit will start with the endpoint.
The operator behind OpenSUpdater is using a new way to sneak adware and other malware past security tools.
The operator behind OpenSUpdater is using a new way to sneak adware and other malware past security tools.
The cyber espionage group has a custom backdoor and has added the ProxyLogon Microsoft Exchange flaw to its toolkit.
The cyber espionage group has a custom backdoor and has added the ProxyLogon Microsoft Exchange flaw to its toolkit.
One of the iOS vulnerabilities was discovered by Citizen Lab; the Google Threat Analysis Group reported iOS and macOS flaws.
One of the iOS vulnerabilities was discovered by Citizen Lab; the Google Threat Analysis Group reported iOS and macOS flaws.
Researchers claim to have accessed hundreds of thousands of Windows credentials using a bug in the Autodiscover protocol.
Researchers claim to have accessed hundreds of thousands of Windows credentials using a bug in the Autodiscover protocol.
The vast majority of users worry about compromised passwords, but two-thirds continue to use the same password or a variation, a survey finds.
The vast majority of users worry about compromised passwords, but two-thirds continue to use the same password or a variation, a survey finds.
Latest Commentary
Our Eye Is on the SPARROW
How unauthorized users can exploit wireless infrastructures for covert communication.
How to Implement a Security Champions Program
A Security Champions program is a great way to enhance security maturity, reduce vulnerabilities, and make security top of mind throughout the business.
NIST Brings Threat Modeling into the Spotlight
NIST recommendations typically become part of government procurement, which means threat modeling will soon be written into questions for organizations that sell to the federal government.
UK MoD Data Breach Shows Cybersecurity Must Protect Both People and Data
The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences.
Midmarket Security: Think You’re Safe? Think Again
Gone is the false perception that large enterprises, banks, and financial institutions are the only organizations under attack.
Products & Releases
Connect with us
Register for a
Subscribe to the
Follow us
Dark Reading Account
Dark Reading newsletter
@DarkReading
Register for a
Dark Reading Account
- Gain full access to resources (events, white paper, webinars, reports, etc.)
- Single sign-on to all Informa products
Subscribe to the
Dark Reading newsletter
Get daily Dark Reading top stories every morning straight into your inbox
Follow us
@DarkReading
Follow us @darkreading to stay up-to-date with the latest news & insider information about events & more