How one man silently infiltrated dozens of high-tech networks
February 16 2021Ever counted how many external source code dependencies your fancy new software product has? Be prepared for a surprise!
Read moreEver counted how many external source code dependencies your fancy new software product has? Be prepared for a surprise!
Read moreAs a total sucker for anything skimming-related, I was interested to hear from a reader working security for a retail chain in the United States that recently found bluetooth-enabled...
Read moreThe US Cyber Command has released a series of ten Valentine’s Day “Cryptography Challenge Puzzles.” Slashdot thread. Reddit thread. (And here’s the archived link, in case Cyber Command takes the...
Read more
Vice is reporting on a new police hack: playing copyrighted music when being filmed by citizens, trying to provoke social media sites into taking the videos down and...
Read moreLatest episode - watch now!
Read moreUsers' distrust of corporate security teams is exposing businesses to unnecessary vulnerabilities.
Read moreMore good news in the cybercrime law-and-order world, this time a bust of ransomware crooks.
Read moreConsumer banks, exchanges, payment firms, and card issuing companies around the globe were among those hit.
Read moreHave a new idea, a lesson learned, or a call to action for your fellow cybersecurity professionals? Here's how to submit your Commentary pieces to Dark Reading.
Read more
At the virtual Enigma Conference, Google’s Project Zero’s Maggie Stone gave a talk about zero-day exploits in the wild. In it, she talked about how often vendors...
Read more
Recent Comments