Follow Dark Reading:
 April 19, 2017
LATEST SECURITY NEWS & COMMENTARY
Advanced, Low-Cost Ransomware Tools on the Rise
New offerings cost as little as $175 and come with lots of anti-detection bells and whistles.
'Intrusion Suppression:' Transforming Castles into Prisons
How building cybersecurity structures that decrease adversaries' dwell time can reduce the damage from a cyberattack.
CISO's, Board Members Have Widely Divergent Views on Cybersecurity
Boards often want a lot more business-relevant reporting than CISOs provide, Focal Point Data Risk study shows.
How Top Security Execs are Doing More with Less
Even the largest corporations aren't immune to the cybersecurity skills gap - an inside look at how they are coping and adjusting.
SWIFT: System Unaffected Following Shadow Brokers Leak
SWIFT, the interbank messaging system allegedly targeted by the NSA, says there is no indication its network has been compromised.
Identity Thief Faces Potential 22-Year Prison Sentence
A foreign national pleads guilty to two criminal counts after he and his cohorts steal nearly $1.48 million in bogus tax return refunds following an identity theft hack on a Pittsburgh medical center.
The Implications Behind Proposed Internet Privacy Rules
The FCC's overreach needed to be undone to protect the FTC's authority over privacy.
MORE NEWS & COMMENTARY
HOT TOPICS
95% of Organizations Have Employees Seeking to Bypass Security Controls
Use of TOR, private VPNs on the rise in enterprises, Dtex report shows.

New Breed of DDoS Attack On the Rise
Akamai Networks since October has detected and mitigated at least 50 DDoS attacks using Connectionless LDAP.

Health Savings Account Fraud: The Rapidly Growing Threat
As income tax season comes to a close, financially-motivated cybercriminals are honing new tactics for monetizing medical PII.

MORE
SECURITY LIVE AT INTEROP ITX

MAY 15-19, 2017, MGM GRAND, LAS VEGAS

Learn how to defeat social engineering, BEC & Phishing during Interop ITX. And don't forget about the two-day Dark Reading Cybersecurity Summit -- a great "what you need to know now" refresher for the overworked infosec pro or security crash course for the IT generalists in your life.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Get Control Over Your Data Quality/Data Governance

    AllAnalytics' year-end online poll asking about 2017 goals revealed that your top priority this year is around data quality and data trust. How is your data quality program measuring up so far this year? Attend this radio show and find out!

  • Becoming a Threat Hunter in Your Enterprise

    You're tired of waiting. Tired of waiting for your technology to alert you that there's already a problem. You want to be more proactive, sink your hands into those threat intelligence feeds, dig into those behavioral analytics reports, follow one ...

MORE WEBINARS

Partner Perspectives

Cybercrime Tactics & Techniques: Q1 2017
A deep dive into the threats that got our attention during the first three months of the year - and what to expect going forward.

Securing your Privacy on Android
If you work at a company that allows you to use your mobile device to login to email, access company data, or connect to company Wi-Fi, you're more of a security risk than you think.

Top 5 Dumbest Cyber Threats That Still Pay Off
Some hackers are fairly predictable in their successful use of really dumb attacks.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.