11.5 C
London
Sunday, October 22, 2017

WannaCry? You’re Not Alone: The 5 Stages of Security Grief

As breach after breach hits the news, security professionals cope with the classic experiences of denial, anger, bargaining, depression, and acceptance.

DevOps & Security: Butting Heads for Years but Integration Is Happening

A combination of culture change, automation, tools and processes can bring security into the modern world where it can be as agile as other parts of IT.

Data Visualization: Keeping an Eye on Security

Visualization can be one of the most powerful approaches a security team can use to make sense of vast quantities of data.
So why does it end up as an afterthought?

Insecure IoT Devices Pose Physical Threat to General Public

At the car wash, look out for attack robots.

Billy Rios discusses how IoT devices could be hacked to physically attack people -- not just on factory floors, but in everyday public settings.

Decrypting the Motivations Behind NotPetya/ExPetr/GoldenEye

Experts discuss the methods and targets involved in this week's massive malware outbreak to figure out what motivated attackers.

Meet Ripper.cc, A Reputation Service For Cybercriminals

Ripper.cc offers a service to help protect the genuine cybercriminals from the scammers in their midst.

Organizations In 40 Countries Under ‘Invisible’ Cyber Attacks

Unknown threat actors are stealing sensitive financial data using memory resident malware crafted from legitimate tools, Kaspersky Lab warns.

New Breed of DDoS Attack On the Rise

Akamai Networks since October has detected and mitigated at least 50 DDoS attacks using Connectionless LDAP.

CopyCat Malware Infects 14 Million Android Devices

A new malware strain is discovered with a novel approach to infecting Android handheld devices with adware.

Coming Soon to Dark Reading…

Event calendar: Dark Reading brings you threat intelligence tomorrow, boardroom communication next week, and coming in November, a brand new conference in the D.C. area.

2017 Pwnie Awards: Who Won, Lost, and Pwned

Security pros corralled the best and worst of cybersecurity into an award show highlighting exploits, bugs, achievements, and attacks from the past year.

Senators Propose US Elections Cybersecurity Commission

The proposed commission would aim to review the 2016 election process and safeguard future elections from interference.