Follow Dark Reading:
 October 31, 2016
LATEST SECURITY NEWS & COMMENTARY
And Now A PREDATOR To Fight DNS Domain Abuse
Researchers at Princeton and elsewhere demo a new tool for spotting people registering domains for malicious purposes.
Is Your Business Prepared for the SaaS Tsunami?
You don't always have to choose between security and productivity when faced with the challenges of 'Shadow IT.'
A Ransomware Tutorial For SMBs
Small-to-medium-sized businesses are an easy target for ransomware. Here are four tips that will minimize the risk.
How Clinton, Trump Could Champion Cybersecurity
The major party Presidential candidates, which both have experienced the aftermath of hacks and poor security practices of their own, could serve as 'poster children' and advocate for better cybersecurity, experts say.
MORE NEWS & COMMENTARY
HOT TOPICS
20 Endpoint Security Questions You Never Thought to Ask
The endpoint detection and response market is exploding! Here's how to make sense of the options, dig deeper, and separate vendor fact from fiction.

'AtomBombing' Microsoft Windows Via Code Injection
Researchers have identified a new way to inject malicious code into Windows systems -- and it doesn't exploit a vulnerability.

7 Scary Ransomware Families
Here are seven ransomware variants that can creep up on you.

MORE
EDITORS' CHOICE

5 Signs Your Smartphone Has Been Hacked
Mobile devices are increasingly popular vectors for cybercriminals targeting the enterprise. How to tell when a smartphone may be under attack.
Tech Resources
ACCESS TECH LIBRARY NOW

  • DarkReading Virtual Event: Re-Thinking IT Security Strategy

    Despite enterprises spending more money annually on cybersecurity defense than ever before, the number of businesses compromised continues to increase. Today's approach to data defense isn't where it needs to be and it's time for all enterprises, including yours, to ...

  • Who Are the Bad Guys? Understand Cyber Criminals & Their Motivations

    Another key element in assessing risk is assessing your attractiveness as a target. Today's cyber attackers range from financially-motivated criminals to politically-motivated hacktivists to state-sponsored information-gathering hacker units. This session offers a look at the different types of cyber attackers, ...

MORE WEBINARS

Partner Perspectives

Warning: Healthcare Data Under Attack
We as an industry must demand greater protection of our medical data.

Let's Clean Up The Internet By Taking Responsibility For Our Actions
Imagine an Internet with multiple levels of security that users need to earn.

Vendor Security Alliance To Improve Cybersecurity Of Third-Party Providers
Member companies can use their VSA rating when offering their services, effectively skipping the process of verification done by prospective businesses.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.