Follow Dark Reading:
 August 31, 2017
LATEST SECURITY NEWS & COMMENTARY
Office 365: A Vehicle for Internal Phishing Attacks
A new threat uses internal accounts to spread phishing attacks, making fraudulent emails even harder to detect.
The Active Directory Botnet
It's a nightmare of an implementation error with no easy fix. Ty Miller and Paul Kalinin explain how and why an attacker could build an entire botnet inside your organization.
Ransomware Is Going More Corporate, Less Consumer
Cybercriminals on average charge $544 for ransom per device, signaling a new sweet spot for payouts.
Execs Underestimate Risks to Oracle EBS
It's another sign that ERP keeps getting short shrift on the security front.
St. Jude Pacemaker Gets Firmware Update 'Intended as a Recall'
The devices that were the subject of a vulnerability disclosure debate last summer now have an FDA-approved fix.
Hacking the Security Job Application Process
Simple advice to help job seekers dig out of the black hole of recruiter and employer hiring portals.
Cloud Security Alliance Offers Metrics for Cyber Resiliency
As cyberattacks grow in scale and complexity, businesses need metrics and processes to measure threats and restore functionality.
Russian-Speaking Turla Group Uses New Tools to Target Embassies, Consulates
Turla cyber espionage gang has been around for a long time and appears to be back in action after a temporary lull.
'Onliner' Spambot Amassed Hundreds of Millions of Stolen Email Addresses
Massive spambot relying on stolen email addresses, credentials, and SMTP and port information to expand.
MORE NEWS & COMMENTARY
HOT TOPICS
How Hackers Hide Their Malware: The Basics
Malware depends on these four basic techniques to avoid detection.

Training Courses for Aspiring Cybercriminals Put Security Education To Shame
Reasonably priced, module-based training courses and helpful forums will train a beginner in all the tools and techniques of the successful cybercriminal, Rick Holland of Digital Shadows explains.

Apple iOS Exploit Takes Complete Control of Kernel
Researcher demonstrates 'severe' ZIVA exploit at Hack in the Box.

MORE
EDITORS' CHOICE

7 Things to Know About Today's DDoS Attacks
DDoS attacks are no longer something that just big companies in a few industries need to worry about. They have become a threat to every business.
How Hackers Hide Their Malware: Advanced Obfuscation
Hackers continue to develop new ways to break into systems. Here are three of them, along with ways to fight back.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Do Autonomous Cars Dream of Driverless Roads?
The connected car is coming... and with it a need for consistent innovation of network technologies - throughput, latency, coverage, and cost - to keep us safe.

Continuous Compliance and Effective Audit Preparation for the Cloud
Why audits are a necessary evil, and how they can actually help you improve your brand value.

How Quantum Computing Will Change Browser Encryption
From a protocol point of view, we're closer to a large-scale quantum computer than many people think. Here's why that's an important milestone.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.