Follow Dark Reading:
 February 09, 2018
LATEST SECURITY NEWS & COMMENTARY
7 Ways to Maximize Your Security Dollars
Budget and resource constraints can make it hard for you to meet security requirements, but there are ways you can stretch your budget.
New POS Malware Steals Data via DNS Traffic
UDPoS is disguised to appear like a LogMeIn service pack, Forcepoint says.
20 Signs You Need to Introduce Automation into Security Ops
Far too often, organizations approach automation as a solution looking for a problem rather than the other way around.
Apple iOS iBoot Secure Bootloader Code Leaked Online
Lawyers for Apple called for the source code to be removed from GitHub.
Tennessee Hospital Hit With Cryptocurrency Mining Malware
Decatur County General Hospital is notifying 24,000 patients of cryptocurrency mining software on its EMR system.
MORE NEWS & COMMENTARY
HOT TOPICS
New Zero-Day Ransomware Evades Microsoft, Google Cloud Malware Detection
Shurl0ckr, a form of Gojdue ransomware, was not detected on SharePoint or Google Drive.

2017 Smashed World's Records for Most Data Breaches, Exposed Information
Five mega-breaches last year accounted for more than 72% of all data records exposed in 2017.

North Korean APT Group Employed Rare Zero-Day Attack
Recent Adobe Flash exploit discovered against South Korean targets likely purchased, not developed by the hacking group.

MORE
EDITORS' CHOICE

IoT Botnets by the Numbers
IoT devices are a botherder's dream attack-vector.
AutoSploit: Mass Exploitation Just Got a Lot Easier
But the response to the new hacking tool, now readily available to the masses of script kiddies, has been a mix of outrage, fear, some applause, and more than a few shrugs.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Your Identity-aware Infrastructure

    Join Darran Rolls, the CTO & CISO of SailPoint, the leader in the Gartner Magic Quadrant for Identity Governance and Administration, as he demonstrates how to build an identity-aware infrastructure.

  • Are you ready for GDPR?

    Discover how you can achieve your data privacy goals by viewing this on-demand webinar.

MORE WEBINARS

Partner Perspectives

BrickerBot: Internet Vigilantism Ends Don't Justify the Means
However noble the intention, obtaining unauthorized access to devices and making them unusable is illegal and undermines the work of ethical researchers.

Top Cloud Security Misconceptions Plaguing Enterprises
Contrary to popular opinion, there is no one single cloud. There are a wealth of cloud-based providers that own dedicated server space across the globe. Here's how to find the best fit for your company.

Ramnit's Holiday Shopping Spree: Retailers & E-commerce
This past season, the authors of a traditional banking Trojan focused on what people do between Thanksgiving and New Year's Day: shop, eat, check their bank account, and entertain.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.