Follow Dark Reading:
 April 27, 2017
LATEST SECURITY NEWS & COMMENTARY
6 Steps to Find Your Next Dozen Cloud Security Experts
There's stiff competition for cloud security experts, but finding yours may actually be easier than you think.
Microsoft App Aims to Delete the Password
Microsoft has officially launched its Authenticator app designed to simplify and secure user logins, raising questions about the future of password-free authentication.
USAF Launches 'Hack the Air Force'
Bug bounty contest expands Defense Department outreach to the global hacker community to find unknown vulnerabilities in DoD networks.
Web Attacks Decline, Ransomware Attacks Surge
Symantec's annual Internet Security Threat Report data shows how attacks last year directly targeted end users, and became more efficient and lucrative.
Call Center Fraud Spiked 113% in 2016
Criminals are increasingly spoofing caller ID using VoIP apps including Skype or Google Voice to hide their identity and location, according to a report released today by Pindrop Labs.
What Role Should ISPs Play in Cybersecurity?
There are many actions ISPs could do to make browsing the Web safer, but one thing stands out.
Chipotle Serves Up Security Incident Warning
The Mexican restaurant chain notifies customers its payment processing system may have been hacked, marking the latest woes for the fast-food maker.
HHS Hits CardioNet with $2.5M HIPAA Settlement Fee
The US Department of Health and Human Services slapped the mobile cardiac monitoring service with fee after breach of customer health data.
MORE NEWS & COMMENTARY
HOT TOPICS
The Hidden Dangers of Component Vulnerabilities
Dangerous flaws in open source components and dependencies lurk within most applications today.

Android Geo-Location Spyware Installed By Up To 5 Million Users
SMSVova, disguised itself as a system update app and duped between 1 million and 5 million users into downloading it from the Google Play store.

The Road Less Traveled: Building a Career in Cyberthreat Intelligence
It's hard to become a threat intelligence pro, but there are three primary ways of going about it.

MORE
EDITORS' CHOICE

Threat Intelligence Is (Still) Broken: A Cautionary Tale from the Past
There is much to be learned from the striking parallels between counter-terrorism threat analysis before 9-11 and how we handle cyber threat intelligence today.
SECURITY LIVE AT INTEROP ITX

10 Questions To Get Practical Answers At Interop ITX
May 15-19 in Las Vegas: How to get solutions and advice from top speakers for the things that you really want to know.
Tech Resources
ACCESS TECH LIBRARY NOW

  • IT Leader's Guide to the Cybersecurity Landscape

    Thanks to a never-ending stream of major and well-publicized data breaches, security has become one of the most critical issues in IT. Attend this webinar to learn about chief threats that IT organizations face, how they can impact your systems ...

  • Sneak Peek: State of Analytics - Research Results Revealed

    How does your analytics initiative shape up? Are you keeping pace with your peers in other organizations? Do you have data scientists in lead roles? Are you driving innovation with data? Have you embarked on Internet of Things (IoT) projects? ...

MORE WEBINARS

Partner Perspectives

Locky Returns with a New (Borrowed) Distribution Method
A layered defense is a strong security posture for dealing with a threat like Locky, that can come in different disguises.

Cybercrime Tactics & Techniques: Q1 2017
A deep dive into the threats that got our attention during the first three months of the year - and what to expect going forward.

Securing your Privacy on Android
If you work at a company that allows you to use your mobile device to login to email, access company data, or connect to company Wi-Fi, you're more of a security risk than you think.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.