Follow Dark Reading:
 February 13, 2017
LATEST SECURITY NEWS & COMMENTARY
Alleged Russian Hacker With Ties To 'Notorious Cybercriminals' Arrested In LA
Alexander Tverdokhlebov is being held on charges of conspiring with another hacker to steal money from online bank accounts.
Turkish Hacker Gets 8 Years In US Jail For ATM Theft Scheme
Ercan Findikoglu carried out three cyberattacks that enabled theft of $55 million through worldwide ATM withdrawals.
Microsoft Beefs Up Enterprise Security In Windows 10, Surface
Microsoft's wave of security news targets hardware, Azure, Office 365, Windows 10, and SQL Server to safeguard business data.
Keep Employees Secure, Wherever They Are
As workers grow more dispersed, organizations need to focus on three areas to maintain security.
MORE NEWS & COMMENTARY
HOT TOPICS
Enterprise Android Vs iOS: Which is More Secure?
The answer is not as simple as you think. A mobile security expert parses the pros and cons.

When Hackers Hack Hackers
Notable cases of internecine cyber squabbles.

Hacking The Penetration Test
Penetration testers rarely get spotted, according to a Rapid7 report analyzing its real-world engagements.

MORE
SPENDING SURVEY

Share Your Thoughts on IT Security

Take the Dark Reading confidential survey about IT security and enter a contest to win an iPad Air 2. Results will be published on Dark Reading and Information Week.


Tech Resources
ACCESS TECH LIBRARY NOW

  • [Cybersecurity] Costs vs. Benefits

    This online event, hosted by the editors of Dark Reading, brings together IT security leaders, business executives, and cyber threat experts will provide you with a holistic view of the costs and benefits of information security investments.

  • [Endpoint Security] Protect Your Memory - Stop Fileless Attacks

    Advanced attackers use sophisticated techniques to compromise, entrench and act on critical assets. With the rise of fileless attacks, Security Operations Center (SOC) teams must protect endpoint memory to stop adversaries from gaining foothold on enterprise endpoints.

MORE WEBINARS

Partner Perspectives

Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Three main threats companies aren't prepared to handle include outside attacks, data vulnerability and insider sabotage.

Meet 'Fruitfly:' Mac Malware Targeting Biomedical Research Centers
This newly discovered code contains indications that it has been circulating undetected for at least a couple years.

Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
When protecting physical or virtual endpoints, it's vital to have more than one layer of defense against malware.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.