Follow Dark Reading:
 February 04, 2017
LATEST SECURITY NEWS & COMMENTARY
10 Essential Elements For Your Incident-Response Plan
The middle of a DDoS attack or ransomware infection is hardly the time to start talking about divisions of labor, or who should do what when.
Windows SMB Zero-Day Exploit On The Loose
Vulnerability allows remote attackers to trigger denial-of-service conditions on several Windows client versions.
Talking Cybersecurity From A Risk Management Point of View
CenturyLink CSO David Mahon reflects on the evolution of the chief information security officer and why today's CISOs are increasingly adopting a risk-based approach to security.
IRS Warns Of New W-2 Phishing Attacks
The infamous Form W-2 email phishing scam plaguing the corporate sector now targeting school districts, tribal organizations, nonprofits, others.
Two Arrested For CCTV Camera Hack On Washington, DC
A British man and Swedish woman have reportedly been arrested in the UK for the cyberattack ahead of Trump's inauguration.
WordPress Quietly Fixes Serious Security Flaw
Wordpress admits delaying its disclosure of a vulnerability that would let attackers modify users' posts or pages.
MORE NEWS & COMMENTARY
HOT TOPICS
Metasploit Can Now Be Directly Linked To Hardware For Vulnerability Testing
New hardware bridge extends penetration testing tools capabilities into physical world.

How I Would Hack Your Network (If I Woke Up Evil)
How would an attacker target your company? Here's a first-person account of what might happen.

Netgear Addresses Password Bypass Vulns In 31 Router Models
Company has made patches, workarounds available to mitigate password bypass threat that potentially impacted 1 million devices, Trustwave says.

MORE
EDITOR'S CHOICE

Take The Dark Reading Threat Intel Survey

Answer 20 confidential questions exploring how enterprises collect and use threat intelligence data and enter a contest to win an iPad Air. Results will be published on Dark Reading.


How to Handle Threats When Short-Staffed
Skybox's Michelle Cobb, VP of Worldwide Marketing, explains how automation and advanced analytics can give security teams the data they need when their teams are stretched
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Three main threats companies aren't prepared to handle include outside attacks, data vulnerability and insider sabotage.

Meet 'Fruitfly:' Mac Malware Targeting Biomedical Research Centers
This newly discovered code contains indications that it has been circulating undetected for at least a couple years.

Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
When protecting physical or virtual endpoints, it's vital to have more than one layer of defense against malware.

FEATURED REPORTS
  • [Secure Application Development] New Best Practices

    The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure ...

  • How Enterprises Are Attacking the IT Security Enterprise Challenge

    Information Security professionals have been making hard choices on the fly for some time, but the unrelenting nature of attacks and threats to users have raised the stakes. To learn more about what organizations are doing to tackle these threats ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.