Follow Dark Reading:
 December 22, 2016
LATEST SECURITY NEWS & COMMENTARY
'Alice' Malware Loots ATMs
Trend Micro has an alert about a new bare-bones ATM malware family it recently uncovered.
Security Analytics: Don't Let Your Data Lake Turn Into A Data Swamp
It's easy to get bogged down when looking for insights from data using Hadoop. But that doesn't have to happen, and these tips can help.
Ukraine Investigates Possible Cyberattack In Kiev Blackout
External interference could be reason for sudden outage in Pivnichna substation cutting off power for several hours.
Man Pleads Guilty To Hacking Competitor's Business
Texas man allegedly stole customer information from 700,000 accounts on his victim's website.
MORE NEWS & COMMENTARY
HOT TOPICS
Has The Security Industry Failed Its Customers?
Short answer: Not really. But the odds of staying safe from a cyberattack go way up when you follow these six tips for security hygiene.

Russian Hackers Run Record-Breaking Online Ad-Fraud Operation
'Methbot' is a sophisticated cybercrime scheme that has hit major US advertisers and publishing brands and pilfered millions of dollars per day.

MORE
EDITORS' CHOICE

Report: ShadowBrokers Obtained Stolen NSA Info Via Rogue Insider
Flashpoint researchers have 'medium confidence' that rogue insider, not just outside hacker, was involved in ShadowBrokers' August and December data dumps.
8 Most Hackable Holiday Gifts, 2016 Edition
You better watch out! Otherwise, you may be giving the gift of malware or unauthorized access to networks and devices.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Strengthen Your Security With Threat Analysis

    In the past, security response teams and security operations centers (SOCs) have focused most of their effort on reacting to new attacks and compromises. But as threat intelligence becomes more sophisticated and "threat hunting" becomes a more common tool in ...

  • Bug Bounty Programs: The 7 Myths, Hackers, & Impact

    Despite thousands of large and small organizations running bug bounty programs, there is still a lot of fear and uncertainty about these in the cybersecurity community. In this webinar we will explore 7 myths about Bug Bounty programs, the hackers who ...

MORE WEBINARS

Partner Perspectives

Explained: Domain-Generating Algorithms
Cybercriminals use domain-generating algorithms to prevent their servers from being blacklisted or taken down.

Investments In Security Operations Centers Are Paying Off, Study Finds
SOCs help organizations reduce security incidents and improve operational maturity.

Phishing Can Leverage Users To Bypass Sandboxes
Using social engineering to bypass traditional security defenses is not new and will certainly continue to grow.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Cybersecurity Is Maturing, People Still the Problem: Nuix
A Nuix executive survey discovered cybersecurity approaches are maturing, but spending is misdirected and human behavior is the largest security threat.
Consumers More Worried About Cybercrime Than Physical World Crime: Sophos
A Sophos survey discovered consumers are more concerned about cybercrime than physical world crime, yet awareness of phishing scams and ransomware remains low.
MORE PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.