California

» Auto updated continuously

• Source limited to: Dark Reading

 2020-06-04 11:30 

Dark Reading

What Usability Means to Security Pros...

The last thing cybersecurity executives and practitioners need are even more tools that are difficult to operate. Here's what they look for when assessing new tools....

 2020-06-03 21:25 

Dark Reading

Kaspersky IDs Sophisticated New Malware Targeted at Air-Gapped Systems...

'USBCulprit' is one of several tools that suggest previously known Cycldek group is more dangerous than previous assumed, security vendor says....

 2020-06-03 20:30 

Dark Reading

RATs 101: The Grimy Trojans That Scurry Through Remote Access Pipes...

Remote Access Trojans (RATs) can be the beginning of very bad things on your network or workstations....

 2020-06-03 20:25 

Dark Reading

Google Faces $5B Lawsuit for Tracking Users in Incognito Mode...

A proposed class-action lawsuit accuses Google of collecting browser data from people who used "private" mode....

 2020-06-03 19:15 

Dark Reading

Chasing RobbinHood: Up Close with an Evolving Threat...

A security researcher details how RobbinHood has changed and why it remains a threat for businesses to watch....

 2020-06-03 18:45 

Dark Reading

Old Spreadsheet Macro Tech Newly Popular with Criminals...

A 30-year-old macro technology for Microsoft Excel is finding new popularity as a cybersecurity attack vector....

 2020-06-03 18:00 

Dark Reading

What Government Contractors Need to Know About NIST, DFARS Password Reqs...

Organizations that fail to comply with these rules can get hit with backbreaking fines and class-action lawsuits....

 2020-06-03 15:45 

Dark Reading

Many Exchange Servers Are Still Vulnerable to Remote Exploit...

A privilege-escalation vulnerability patched in February by Microsoft continues to affect Exchange servers, with more than 80% of Internet-connected servers remaining vulnerable, one firm reports....

 2020-06-03 14:00 

Dark Reading

Social Distancing for Healthcare's IoT Devices...

Security pros need to double down around prevention of lateral movement by attackers, especially if IoT devices are connected to the network....

  • Need an account?  
    or