Follow Dark Reading:
 December 14, 2016
LATEST SECURITY NEWS & COMMENTARY
91% Of Cyberattacks Start With A Phishing Email
Phishing remains the number one attack vector, according to a new study that analyzes why users fall for these lures.
Nearly Half Of The Top 1 Million Websites Deemed Risky
Forty-six percent of the top million websites, as ranked by Alexa, pose potential malware risks to businesses.
The Internet Of Things: When Bigger Is Not Better
What happens when 10,000 companies add programmability and connectivity to their products, and we increase the Internet's attack surface by a million times or more?
Microsoft Patches Dangerous Backdoor In Skype For Mac OS X
Vulnerability would have let attackers record calls, intercept and read messages, and siphon out all kinds of data, Trustwave says.
FBI Had Alerted Illinois GOP About Possible Email Hack
RNC chief says party was not hacked while Trump dismisses CIA report that Russian hackers tried to influence presidential poll.
Global Cybercrime Sweep Targeted Young DDoS Attackers
European Cybercrime Centre and EU nations conduct five-day operation and arrest 34 on distributed denial-of-service attack charges.
MORE NEWS & COMMENTARY
HOT TOPICS
The Coolest Hacks Of 2016
No 400-pound hacker here: Lightbulb and 'do-gooder' worms, machines replacing humans to hack other machines, and high-speed car hacking were among the most innovative white-hat hacks this year.

The 7 Most Sensational Breaches Of 2016
The biggest hacks, data exposures, and thefts that left companies and government entities reeling.

What's Naughty & Nice About The Internet Of Things
It's easy to catalogue the worst IoT security hazards. But that's not the whole story.

MORE
DR RADIO TODAY AT 1PM ET!

Dark Reading Radio: The Coolest Hacks Of 2016
Tune in this Wednesday, Dec. 14 at 1pm ET to hear famed researchers Samy Kamkar and Levi Gundert weigh in on some of the most innovative and creative white-hat hacks from the past year.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Threats] 4 Keys for Better Security

    In this webinar, Ixia will show how to combine the four keys to improving security threat detection into a Security Fabric to deliver greater context and intelligent distribution to monitored traffic. You will learn how to create actionable threat intelligence ...

  • 7 Key Cloud Security Trends Shaping 2017 & Beyond

    Cloud computing is enabling business transformation as organizations accelerate time to market and business agility. Evolving cloud technologies and approaches, however, can create security gaps and human errors. Data protection rests with you and your organization and not the cloud ...

MORE WEBINARS

Partner Perspectives

Security In 2017: Ransomware Will Remain King
Businesses, consumers, and security professionals must face this reality and take the necessary steps to educate each other and protect their networks.

Machine-Learning Algorithms Improve Detection Time For Modern Threats
Artificial intelligence and machine learning are essential to combat a threat landscape that is larger and more sophisticated than ever.

Survey Stresses Importance Of Securing The Internet of Things
If organizations monitor and deploy IoT devices with caution, they can stay ahead of the curve and continue to keep all of their endpoints protected.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.