Follow Dark Reading:
 October 25, 2017
LATEST SECURITY NEWS & COMMENTARY
'Bad Rabbit' Ransomware Attacks Rock Russia, Ukraine - and Beyond
Attack employs new version of infamous NotPetya ransomware used in June attacks on Ukraine targets.
Why Patching Software Is Hard: Technical Challenges
Huge companies like Equifax can stumble over basic technical issues. Here's why.
Opera, Vivaldi Co-Founder Talks Internet Privacy
Most people don't understand the extent to which their personal information is at risk, says Jon von Tetzchner, who founded the Opera and Vivaldi browser firms.
New Tool Debuts for Hacking Back at Hackers in Your Network
Deception technology firm Cymmetria offers a new offense option for defenders.
Finding Your Appetite for Security Automation (and Why That's Important)
Yes, automation is becoming increasingly critical. But before you go all-in, determine the level that's right for your company.
One-Third of Businesses Can't Keep Up with Cloud Security
One in three organizations cannot maintain security as cloud and container environments expand.
New Cybercrime Insurance Policy Protects the 'High Net Worth' Set
Rubica is offering its active subscribers a $1 million cybersecurity insurance policy via its partner PURE Starling.
MORE NEWS & COMMENTARY
HOT TOPICS
10 Social Engineering Attacks Your End Users Need to Know About
It's Cybersecurity Awareness Month. Make sure your users are briefed on these 10 attacker techniques that are often overlooked.

The Week in Crypto: Bad News for SSH, WPA2, RSA & Privacy
KRACK, ROCO, exposed SSH keys and the European Commission's loosey-goosey stance on backdoors have made it a rough week for cryptography. Here's your wrap-up on the best of the worst.

'BoundHook' Technique Enables Attacker Persistence on Windows Systems
CyberArk shows how attackers can leverage Intel's MPX technology to burrow deeper into a compromised Windows system.

MORE
EDITORS' CHOICE

10 Steps for Stretching Your IT Security Budget
When the budget gods decline your request for an increase, here are 10 ways to stretch that dollar.
SAVE THE DATE

New Dark Reading Conference Will Focus on Defense
The INsecurity Conference, Nov. 29-30 at the Gaylord National Harbor in Maryland is all about helping infosecurity pros mitigate threats -- from hot topics to basic hygiene.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Security for the IoT

    In this webcast, experts discuss the most effective approaches to securing Internet-enabled systems and offer advice on monitoring and protecting next-generation IoT technology. Register today!

  • Ransomware: Latest Developments & How to Defend Against Them

    Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly are just around the corner. Learn how ransomware can affect your organization and steps you can take to defend your systems and users against ...

MORE WEBINARS

Partner Perspectives

CISOs: Striving Toward Proactive Security Strategies
A new survey paints a compelling picture of the modern security executive, how they succeed, and how much power they wield.

6 Steps to Finding Honey in the OWASP
The most famous project of the Open Web Application Security Project is getting an update. Here's what you need to know, and how you can get involved.

Can Machine Learning Outsmart Malware?
Using machine learning in the cybersecurity domain is a growing trend with many advantages, but it also has its risks.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.