Follow Dark Reading:
 April 17, 2017
LATEST SECURITY NEWS & COMMENTARY
6 New Security Startups Named to Mach37 Spring Cohort
The companies selected this year include technical talent that draws from Silicon Valley to Hungary and Western Europe.
Ransomware, Mac Malware Dominate Q1 Threat Landscape
Cerber, somewhat unexpectedly, emerged as the biggest ransomware threat, Malwarebytes found.
The Long Slog To Getting Encryption Right
Encryption practices have improved dramatically over the last 10 years, but most organizations still don't have enterprise-wide crypto strategies.
Engineer Arrested for Attempted Theft of Trade Secrets
Software engineer Dmitry Sazonov has been arrested for trying to steal valuable code from his employer, a financial services firm.
Microsoft: Foreign Surveillance Requests Under FISA Shot Up in 2016
The company received 1,000-1,499 surveillance requests from January0- toJune 2016, the highest since 2011.
Nearly 40% of Ransomware Victims Pay Attackers
Ransomware is targeting more consumers, and many of them are paying hundreds to attackers.
1 Out of 5 Companies Have Suffered Mobile Device Breach
A survey on security solutions for mobile devices finds 24% don't even know if they have been breached.
MORE NEWS & COMMENTARY
HOT TOPICS
Health Savings Account Fraud: The Rapidly Growing Threat
As income tax season comes to a close, financially-motivated cybercriminals are honing new tactics for monetizing medical PII.

So You Want to Be a Security Rock Star?
While the thrill of crafting attention-grabbing stunt hacks may seem like the coolest job on earth, what our industry needs more of are strong defenders who can fix things as well as break them.

MORE
Live At Interop ITX

10 Questions To Get Practical Answers At Interop ITX
May 15-19 in Las Vegas: How to get solutions and advice from top speakers for the things that you really want to know.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Get Control Over Your Data Quality/Data Governance

    AllAnalytics' year-end online poll asking about 2017 goals revealed that your top priority this year is around data quality and data trust. How is your data quality program measuring up so far this year? Attend this radio show and find out!

  • Becoming a Threat Hunter in Your Enterprise

    You're tired of waiting. Tired of waiting for your technology to alert you that there's already a problem. You want to be more proactive, sink your hands into those threat intelligence feeds, dig into those behavioral analytics reports, follow one ...

MORE WEBINARS

Partner Perspectives

Securing your Privacy on Android
If you work at a company that allows you to use your mobile device to login to email, access company data, or connect to company Wi-Fi, you're more of a security risk than you think.

Top 5 Dumbest Cyber Threats That Still Pay Off
Some hackers are fairly predictable in their successful use of really dumb attacks.

Exploit Kits: Winter 2017 Review
We take another look at the current EK scene by going over RIG, Sundown, Neutrino and Magnitude.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.