Follow Dark Reading:
 December 08, 2016
LATEST SECURITY NEWS & COMMENTARY
Adobe Flash Flaws Dominate Exploit Kits In 2016
The top 10 vulnerabilities this year were mostly Adobe Flash, followed by Internet Explorer, according to a Recorded Future study.
Las Vegas, Rust Belt, Hit Hardest By Ransomware
New study by Malwarebytes finds that the US has the most ransomware incidents worldwide.
US Presidential Commission Outlines Key Cybersecurity Actions For Future Administrations
Report outlines ways to lock down critical infrastructure as well as IoT - and the urgent need to expand the security workforce by 2020 with 100,000 new jobs.
20 Questions Smart Security Pros Should Ask About 'Intelligence'
Threat intel is a hot but complicated topic that encompasses a lot more than just data feeds. Here's how to get beyond the fear, uncertainty, and doubt to maximize its potential.
Researchers Find Backdoors, Bugs In Sony, White Box IP Cameras
New vulnerabilities discovered by SEC Consult and Cybereason highight increasing IoT threat to enterprises.
The Human Firewall: Why People Are Critical To Email Security
Technology is just the beginning; employees must be fully on board with security procedures.
MORE NEWS & COMMENTARY
HOT TOPICS
Where Cybercriminals Go To Buy Your Stolen Data
What malicious sites provide both free and paid access to stolen credit cards, company databases, malware and more?

'Frighteningly Easy' Hack Guesses Full Credit Card Details In 6 Seconds
Attack works only on Visa network, Newcastle University researchers say.

The Rise Of SecBizOps & Why It Matters
By aligning security dollars and technology with core business requirements, infosec can become a business enabler, not a business impediment.

MORE
EDITORS' CHOICE

The 7 Most Sensational Breaches Of 2016
The biggest hacks, data exposures, and thefts that left companies and government entities reeling.
CARTOON CAPTION CONTEST

Name That Tune: Naughty or Nice

Enter a caption and win an Amazon gift card!


Tech Resources
ACCESS TECH LIBRARY NOW

  • [Cybersecurity] Build & Maintain an Effective Cyberthreat-Hunting Team

    As online attackers and exploits get more sophisticated, many enterprises are discovering that more traditional, passive methods of detecting cyberthreats aren't working as well as they used to. To help find and eradicate sophisticated threats more quickly, enterprises are building "...

  • [Ransomware] Taking the Mystery out of Ransomware

    Lost data. Systems locked down. Whole companies coming to a grinding halt. When it comes to ransomware, the damage it can do to your company is immense. Many companies are perplexed by ransomware and don't know how to best protect ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.