Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Security Pro File: Award-winning computer scientist and electronic voting expert Barbara Simons chats up her pioneering days in computer programming, paper-ballot backups, Internet voting, math, and sushi. → Read More
Infamous cybercrime organization spotted in attacks that employ legitimate software -- and Google Drive. → Read More
A total of 2.7 billion email addresses, 1 billion email account passwords, and nearly 800,000 applications for copies of birth certificate were found on unsecured cloud buckets. → Read More
Women and minorities in the security industry share some hard truths about the security industry's hiring traditions and practices. → Read More
Time to set cyber espionage 'norms' before more volatile nation-states follow suit, experts say. → Read More
New research from Neustar shows how attackers could abuse DNSSEC-secured domains for distributed denial-of-service (DDoS) attacks. → Read More
HHS addresses ransomware infections in wake of healthcare attacks. → Read More
Sometimes it's about a beer, but it's mainly about being prepared before opening the threat intel floodgates. → Read More
ICSA Labs now offers a security testing program for IoT products, following the recently announced 'CyberUL' security certification program. → Read More
Resurgence in macro attacks result in Microsoft adding new protections from macro abuse. → Read More
In honor of Dark Reading's 10-year anniversary, a look at ten of the biggest failed security trends, technologies, and tactics. → Read More
Reinfected machines likely part of the 5.5 to 6 million-strong Conficker headcount → Read More
Georgia Tech researchers create algorithm to help detect rising DNS domain abuse by cybercriminals, nation-state actors. → Read More
In honor of Dark Reading's 10th anniversary, I embarrass myself one more time for posterity. → Read More
Join us on Wednesday, May 18 at 1pmEDT/10am PDT, for a discussion with security executives on how to prioritize and manage your IT security budget. → Read More
A mostly unknown Web vulnerability called Cross-Site Request Forgery could be the next attack vector on your Website → Read More
All about that puzzler's paradise that is the 2016 Annual Verizon Data Breach Investigations Report cover contest. → Read More
Nearly 90 percent of healthcare organizations were slammed by a breach in the past two years. → Read More
A 'vanishing' physical network perimeter in the age of mobile, cloud services, and the Internet of Things, is changing network security as well. → Read More
Apple is quietly making some subtle, incremental security moves in the face of new threats to its products → Read More