Follow Dark Reading:
 June 29, 2016
LATEST SECURITY NEWS & COMMENTARY
Attackers Wrapping New Tools In Old Malware To Target Medical Devices
Hospital equipment running old operating systems providing safe harbor for data theft, TrapX says.
Cisco Boosts Cloud Security Capabilities With CloudLock Buy
Network giant will purchase the Massachusetts-based provider of cloud access security broker technology for $293 million.

Microsoft + LinkedIn: How To Spot Insider Trading Risk Early

With the explosion of mobile, cloud, and the blurring of work and personal data, companies considering M&A have a lot to worry about when it comes to insider threats.


China Inches Closer To Finalizing Strict Cybersecurity Law
Second reading of cybersecurity draft over, measures indicate greater censorship in store for citizens.
Bots Sign Online Petition For Second EU Referendum Post-Brexit
Petition website appears to be hijacked by automated bots, thousands of signatures fake, says Parliamentary panel.
MORE NEWS & COMMENTARY
HOT TOPICS
Cerber Strikes With Office 365 Zero-Day Attacks
Ransomware variant continues its success through chameleon-like reinvention.

NASCAR Race Team Learns Ransomware Lesson The Hard Way
Pays ransom to save $2 million worth of information, warns others of the dangers.

Mind The Gap: CISOs Versus 'Operators'
How open communication among security execs and analysts, incidents responders, and engineers can help organizations stay on top of the constantly changing threat landscape.

MORE
IN CASE YOU MISSED IT

An Inside Look At The Mitsubishi Outlander Hack
White hat hacker finds WiFi flaws in mobile app for popular auto; Mitsubishi working on fix.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Shifting The Economic Balance Of Cyberattacks
Our goal should be to simply make the cost of conducting a cyberattack so expensive that cybercriminals view attacking our organization as a bad return on investment.

Adaptive Security Demands A Shift In Mindset: Part 2 In A Series
By adopting new ways of thinking about security, improving the capabilities of existing systems, and integrating key innovations, enterprises will be well on their way to better security.

The Importance Of Taking A More Active Role To Protect Our Data
Big data has lots of potential to make our decisions more efficient and effective. But like any powerful substance, too much in the wrong hands can have disastrous consequences.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.