Follow Dark Reading:
 December 22, 2016
LATEST SECURITY NEWS & COMMENTARY
5 Ways The Cyber-Threat Landscape Shifted In 2016
IoT botnets and turnkey phishing services were just some of the ways the bad guys stayed ahead in 2016.
Panasonic Inflight Entertainment System Vulnerable To Attack
Flaws could theoretically allow access to aircraft control systems, IOActive says in disputed report.
Report: ShadowBrokers Obtained Stolen NSA Info Via Rogue Insider
Flashpoint researchers have 'medium confidence' that rogue insider, not just outside hacker, was involved in ShadowBrokers' August and December data dumps.
'Alice' Malware Loots ATMs
Trend Micro has an alert about a new bare-bones ATM malware family it recently uncovered.
Spammers Work Up A Hailstorm
In their constant effort to evade anti-spam filters, spammers have devised a new way to deliver junk mail to your inbox.
MORE NEWS & COMMENTARY
HOT TOPICS
Russian Hackers Run Record-Breaking Online Ad-Fraud Operation
'Methbot' is a sophisticated cybercrime scheme that has hit major US advertisers and publishing brands and pilfered millions of dollars per day.

Has The Security Industry Failed Its Customers?
Short answer: Not really. But the odds of staying safe from a cyberattack go way up when you follow these six tips for security hygiene.

MORE
EDITOR'S CHOICE

Application Security Still Slows Developer Work
Cooperation among DevOps teams might be growing, but security testing still seen as a road block to continuous delivery.
20 Questions Security Pros Should Ask Themselves Before Moving To The Cloud
A template for working collaboratively with the business in today's rapidly changing technology environment.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Strengthen Your Security With Threat Analysis

    In the past, security response teams and security operations centers (SOCs) have focused most of their effort on reacting to new attacks and compromises. But as threat intelligence becomes more sophisticated and "threat hunting" becomes a more common tool in ...

  • Bug Bounty Programs: The 7 Myths, Hackers, & Impact

    Despite thousands of large and small organizations running bug bounty programs, there is still a lot of fear and uncertainty about these in the cybersecurity community. In this webinar we will explore 7 myths about Bug Bounty programs, the hackers who ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.