Follow Dark Reading:
 February 03, 2018
LATEST SECURITY NEWS & COMMENTARY
APIs Pose 'Mushrooming' Security Risk
As APIs grow in prominence, top security concerns include bots and authentication.
3 Ways Hackers Steal Your Company's Mobile Data
The most effective data exfiltration prevention strategies are those that are as rigorous in vetting traffic entering the network as they are traffic leaving it.
Russian National Arrested for Kelihos Botnet Sent to US
Peter Levashov, among the world's most notorious email spammers, has been extradited to the US.
Cyberattack Impersonates FBI Internet Crime Complaint Center
Threat actors trick victims into sharing personal information with fake IC3 messages laced with malware.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Issues Emergency Patch to Disable Intel's Broken Spectre Fix
Affected Windows systems can also be set to "disable" or "enable" the Intel microcode update for Spectre attacks.

DNS Hijacking: The Silent Threat That's Putting Your Network at Risk
The technique is easy to carry out and can cause much damage. Here's what you need to know about fighting back.

Thinking about a Career Move in Cybersecurity?
The numbers show career opportunities for cyber defenders.

MORE
EDITORS' CHOICE

IoT Botnets by the Numbers
IoT devices are a botherder's dream attack-vector.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Your Identity-aware Infrastructure

    Join Darran Rolls, the CTO & CISO of SailPoint, the leader in the Gartner Magic Quadrant for Identity Governance and Administration, as he demonstrates how to build an identity-aware infrastructure.

  • How to Win with Omnichannel, IoT, and the Connected Consumer in 2018

    Join AllAnalytics Radio live from the National Retail Federation Big Show as we welcome Daniel Newman, principal analyst and founding partner of Futurum Research. We'll ask Newman about the concept of the connected consumer and how omnichannel retailers can leverage ...

MORE WEBINARS

Partner Perspectives

Ramnit's Holiday Shopping Spree: Retailers & E-commerce
This past season, the authors of a traditional banking Trojan focused on what people do between Thanksgiving and New Year's Day: shop, eat, check their bank account, and entertain.

Data Encryption: 4 Common Pitfalls
To maximize encryption effectiveness you must minimize adverse effects in network performance and complexity. Here's how.

Selling Cloud-Based Cybersecurity to a Skeptic
When it comes to security, organizations don't need to look at cloud as an either/or proposition. But there are misconceptions that need to be addressed.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.