Follow Dark Reading:
 December 20, 2016
LATEST SECURITY NEWS & COMMENTARY
5 Ways The Cyber-Threat Landscape Shifted In 2016
IoT botnets and turnkey phishing services were just some of the ways the bad guys stayed ahead in 2016.
Brute-Force Botnet Attacks Now Elude Volumetric Detection
It just became harder to distinguish bot behavior from human behavior.
Spammers Work Up A Hailstorm
In their constant effort to evade anti-spam filters, spammers have devised a new way to deliver junk mail to your inbox.
Financial Data Worth Millions Unwittingly Exposed In Ameriprise Accounts
Leak of bank account and financial planning details emanated from a financial advisor's unsecured Internet-connected backup drive at home.
US Charges 3 Romanians With Cyber Fraud Involving $4 Million
Defendants extradited to US for alleged conspiracy that infected 60,000 computers and sent 11 million malicious emails.
MORE NEWS & COMMENTARY
HOT TOPICS
Has The Security Industry Failed Its Customers?
Short answer: Not really. But the odds of staying safe from a cyberattack go way up when you follow these six tips for security hygiene.

Microsoft Execs: Identity, Threat Intelligence Driving Company's Security Strategy
One year after Microsoft announced its $1B investment into a holistic cybersecurity strategy, executives discuss how their plans unfolded and what's on the agenda for 2017.

91% Of Cyberattacks Start With A Phishing Email
Phishing remains the number one attack vector, according to a new study that analyzes why users fall for these lures.

MORE
EDITORS' CHOICE

8 Most Hackable Holiday Gifts, 2016 Edition
You better watch out! Otherwise, you may be giving the gift of malware or unauthorized access to networks and devices.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Can You Trust Your Data?

    In the aftermath of a US presidential election in which all major polls failed to predict the outcome -- the election of Donald J. Trump over Hillary Clinton -- plenty of people are wondering what happened. Can they trust data ...

  • Developing & Testing an Effective Incident Response Program

    If your organization doesn't have a plan for handling a major data breach, you're already in trouble. In order to swiftly and effectively respond to a cyber compromise, you must develop a program for first response in the data center, ...

MORE WEBINARS

Partner Perspectives

Investments In Security Operations Centers Are Paying Off, Study Finds
SOCs help organizations reduce security incidents and improve operational maturity.

Phishing Can Leverage Users To Bypass Sandboxes
Using social engineering to bypass traditional security defenses is not new and will certainly continue to grow.

Are Unconscious Biases Weakening Your Security Posture?
Proactively addressing your biases can help you build a resilient and adaptable security foundation.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.