Follow Dark Reading:
 July 09, 2016
LATEST SECURITY NEWS & COMMENTARY
An Inside Look At The New Apple Mac Malware 'Eleanor'
Researchers from Bitdefender find security hole that opens up a backdoor to the Mac OS X system.
Wendy's Gives Details On Payment Card Breach
Fast food chain reveals franchisees hit and offers support services for affected customers.
Report: Criminals Now Hack, Start And Then Steal Vehicles
Thieves are using a mystery electronic device to turn on car ignition, say the police.
Avast Acquires Anti-Virus Rival AVG In $1.3 Billion Deal
Transaction gives Avast access to 400 million devices.
MORE NEWS & COMMENTARY
HOT TOPICS
A Holistic Approach to Cybersecurity Wellness: 3 Strategies
Security professionals need to rely on more than 'vaccinations' to protect the health and safety of company systems and data.

Hacking A Penetration Tester
How even a pen test conducted by a security pro can be hacked by a determined attacker looking for a way to its target.

MORE
EDITOR'S CHOICE

NATO Ambassador: How The Ukraine Crisis Fits Cyber War Narrative
Kenneth Geers previews his Black Hat talk and discusses the strategic military maneuvers governments can make within cyberspace.
So You Want To Be A Penetration Tester
Penetration testers must have an innate curiosity of how networked systems work coupled with a solid understanding of IT operations. It also helps to be able to think like an attacker.
Tech Resources

Partner Perspectives

Shifting The Economic Balance Of Cyberattacks
Our goal should be to simply make the cost of conducting a cyberattack so expensive that cybercriminals view attacking our organization as a bad return on investment.

Adaptive Security Demands A Shift In Mindset: Part 2 In A Series
By adopting new ways of thinking about security, improving the capabilities of existing systems, and integrating key innovations, enterprises will be well on their way to better security.

The Importance Of Taking A More Active Role To Protect Our Data
Big data has lots of potential to make our decisions more efficient and effective. But like any powerful substance, too much in the wrong hands can have disastrous consequences.

FEATURED REPORTS
  • Gartner Predictions for 2016: Mobile and Wireless

    In this new phase of mobility, wireless and mobile technologies expand our real world beyond simple smart devices, creating new digital worlds. IT leaders and vendors are challenged by new privacy and security threats from new technology sources.

  • Gartner Magic Quadrant for Operational Database Management

    When it comes to managing your data, the choice is clear: Microsoft is an industry leader in operational database management systems (ODBMS). Don't take our word for it; read Gartner's assessment of the ODBMS landscape and see how Microsoft stacks ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.