Follow Dark Reading:
 February 07, 2018
LATEST SECURITY NEWS & COMMENTARY
2017 Smashed World's Records for Most Data Breaches, Exposed Information
Five mega-breaches last year accounted for more than 72% of all data records exposed in 2017.
Identity Fraud Hits All-Time High in 2017
Survey reports that the number of fraud victims topped 16 million consumers last year, and much of that crime has moved online.
Uber's Response to 2016 Data Breach Was 'Legally Reprehensible,' Lawmaker Says
In Senate hearing, Uber CISO admits company messed up in not quickly disclosing breach that exposed data on 57 million people.
Microsoft Updates Payment, Criteria for Windows Bug Bounty
The Windows Insider Preview Bounty Program will award between $500 and $15,000 for eligible submissions.
AutoSploit: Mass Exploitation Just Got a Lot Easier
But the response to the new hacking tool, now readily available to the masses of script kiddies, has been a mix of outrage, fear, some applause, and more than a few shrugs.
Ukraine Power Distro Plans $20 Million Cyber Defense System
After NotPetya and severe blackouts, Ukrenergo responds with an investment in cybersecurity.
Adobe Patches Flash Zero-Day Used in South Korean Attacks
Critical flaw is one of two critical use-after-free vulnerabilities in Flash fixed today by the software firm.
MORE NEWS & COMMENTARY
HOT TOPICS
Thinking about a Career Move in Cybersecurity?
The numbers show career opportunities for cyber defenders.

APIs Pose 'Mushrooming' Security Risk
As APIs grow in prominence, top security concerns include bots and authentication.

Crypto-Mining Attacks Emerge as the New Big Threat to Enterprises
Attackers looking to hijack systems for illegally mining digital currencies have begun eyeing business systems, security vendors say.

MORE
EDITORS' CHOICE

7 Ways to Maximize Your Security Dollars
Budget and resource constraints can make it hard for you to meet security requirements, but there are ways you can stretch your budget.
Security vs. Speed: The Risk of Rushing to the Cloud
Companies overlook critical security steps as they move to adopt the latest cloud applications and services.

Name that Toon: Disappearing Act

We provide the cartoon. You provide the caption.


Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Ramnit's Holiday Shopping Spree: Retailers & E-commerce
This past season, the authors of a traditional banking Trojan focused on what people do between Thanksgiving and New Year's Day: shop, eat, check their bank account, and entertain.

Data Encryption: 4 Common Pitfalls
To maximize encryption effectiveness you must minimize adverse effects in network performance and complexity. Here's how.

Selling Cloud-Based Cybersecurity to a Skeptic
When it comes to security, organizations don't need to look at cloud as an either/or proposition. But there are misconceptions that need to be addressed.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.