Other Important News
DarkReading
Android Developer Tools Contain Vulnerabilities Nearly 2/3 of Industrial Companies Lack Security ...
FBI, Europol, Microsoft, ESET Team Up, Dismantle ... Most Retailers Haven't Fully Tested Their Breach ...
NSA Employee Pleads Guilty to Illegally Retaining ... Why Cybersecurity Must Be an International Effort
PayPal's TIO Networks Suffered Data Breach Exposing ... How the Major Intel ME Firmware Flaw Lets Attackers ...
The Rising Dangers of Unsecured IoT Technology Ransomware Meets 'Grey's Anatomy'
Tips for Writing Better Infosec Job Descriptions Romanian Nationals Admit to Racketeering ...
Improve Signal-to-Noise Ratio with 'Content ... 5 Reasons the Cybersecurity Labor Shortfall Won't ...
Study: Simulated Attacks Uncover Real-World ... Post-Breach Carnage: Worst Ways The Axe Fell in 2017
Bitcoin Sites Become Hot Targets for DDoS Attacks What Slugs in a Garden Can Teach Us About Security
Hacked IV Pumps and Digital Smart Pens Can Lead to ... Microsoft Issues Emergency Patch for 'Critical' ...
Cyberattack: It Can't Happen to Us (Until It Does) Conficker: The Worm That Won't Die
Uber Used $100K Bug Bounty to Pay, Silence Florida ... Android Ransomware Kits on the Rise in the Dark Web
Attacker 'Dwell Time' Average Dips Slightly to 86 Days Rutkowska: Trust Makes Us Vulnerable
Why Third-Party Security is your Security Bitcoin Miner NiceHash Hacked, Possibly Losing $62 ...
NIST Releases New Cybersecurity Framework Draft Man-in-the-Middle Flaw in Major Banking, VPN Apps ...
CSOONLINE
IT help wanted, cybersecurity experience preferred What too much power in the hands of one means for security
3 common cybersecurity maturity failings Could the security industry have it all wrong?
How collaboration and community fit into the security industry Does consumer risk outweigh business risk?
Cybersecurity professionals aren’t keeping up with training
What is a supply chain attack? Why you should be wary of third-party
providers
Company with no privacy policy to collect brainwave data on 1.2 million
students
Software development teams: please don't think like a hacker!
Changing Cybersecurity Regulations that Global Financial Services Firms Need
to Know About What is a botnet? And why they aren't going away anytime soon
8 security breaches that got someone fired
GreatHorn detects the most carefully planned email attacks
Symantec warns of surge in spam email spreading Adwind RAT
In pursuit of the elusive green dot
5