Follow Dark Reading:
 October 26, 2017
LATEST SECURITY NEWS & COMMENTARY
Bad Rabbit Dies Down But Questions Remain
The origins of the rapid-fire ransomware attack campaign affecting mainly Russian targets remain a bit of a mystery.
Kaspersky Lab Collected, Then Deleted NSA File from a Home Computer
Concerns over handling classified US data one of the reasons why Kaspersky Lab CEO ordered file deletion, company says.
'BoundHook' Technique Enables Attacker Persistence on Windows Systems
CyberArk shows how attackers can leverage Intel's MPX technology to burrow deeper into a compromised Windows system.
Advanced Analytics + Frictionless Security: What CISOS Need to Know
Advances in analytics technologies promise to make identity management smarter and more transparent to users. But the process is neither straightforward nor easy. Here's why.
IOTroop Botnet Hits Over a Million Organizations in Under 30 Days
The IoT botnet is expected to spread faster than Mirai.
What's Next After HTTPS: A Fully Encrypted Web?
As the rate of HTTPS adoption grows faster by the day, it's only a matter of time before a majority of websites turn on SSL. Here's why.
MORE NEWS & COMMENTARY
HOT TOPICS
The Week in Crypto: Bad News for SSH, WPA2, RSA & Privacy
KRACK, ROCO, exposed SSH keys and the European Commission's loosey-goosey stance on backdoors have made it a rough week for cryptography. Here's your wrap-up on the best of the worst.

10 Social Engineering Attacks Your End Users Need to Know About
It's Cybersecurity Awareness Month. Make sure your users are briefed on these 10 attacker techniques that are often overlooked.

'Bad Rabbit' Ransomware Attacks Rock Russia, Ukraine - and Beyond
Attack employs new version of infamous NotPetya ransomware used in June attacks on Ukraine targets.

MORE
EDITORS' CHOICE

Windows 10 Update: 10 Key New Security Features
Microsoft is tightening its focus on Windows 10 security with several new security tools in its latest major OS update.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Citizen Data Scientists: What Are They, How Can They Help?

    Join us on AllAnalytics radio as we welcome a panel of bloggers to talk about the state of today's citizen data scientist. Our guests include Pierre DeBois, Lisa Morgan, and Jen Underwood.

  • Security Implications of Using VoIP & SIP

    This webinar will examine the security implications of using VoIP and SIP, how to best protect real-time communications traffic with tools you already have as well as with new tools, and how to orchestrate protections to prevent UC security from ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.