Follow Dark Reading:
 July 07, 2017
LATEST SECURITY NEWS & COMMENTARY
Hacking the State of the ISIS Cyber Caliphate
Researchers say Islamic State's United Cyber Caliphate remains in its infancy when it comes to cyberattack expertise.
New Google Security Controls Tighten Third-Party Data Access
Google adds OAuth app whitelisting to G Suite so admins can vet third-party applications before users can grant them authorized data access.
CopyCat Malware Infects 14 Million Android Devices
A new malware strain is discovered with a novel approach to infecting Android handheld devices with adware.
Sabre Breach Investigation Concludes with Impact Limited
The travel company finds that attackers gained limited access to a subset of its bookings in its reservation system.
The Growing Danger of IP Theft and Cyber Extortion
The recent hacks of Disney and Netflix show the jeopardy that intellectual property and company secrets are in, fueled by cheap hacking tools and cryptocurrencies.
MORE NEWS & COMMENTARY
HOT TOPICS
How To (And Not To) Make the Online Trust Honor Roll
Five websites generated the highest score in their sector for the 2017 Online Trust Audit & Honor Roll. Here is what it takes to get there and be listed among the Online Trust Alliance's Top 50

Symantec to Buy 'Browser Isolation' Firm Fireglass
Fireglass's emerging Web security technology will become modular component in Symantec's Integrated Cyber Defense Platform.

MORE
EDITORS' CHOICE

Black Hat Survey: Security Pros Expect Major Breaches in Next Two Years
Significant compromises are not just feared, but expected, Black Hat attendees say
8 Things Every Security Pro Should Know About GDPR
Organizations that handle personal data on EU citizens will soon need to comply with new privacy rules. Are you ready?
Tech Resources
ACCESS TECH LIBRARY NOW

  • AI, Machine Learning & The Future of News

    More organizations today are looking to integrate artificial intelligence and machine learning into their operational processes, and news and financial data firm Bloomberg is no exception. A2 Radio welcomes Bloomberg's CTO and Head of Data Science Gideon Mann to the ...

  • New Security Technologies: Advice & Best Practices on Selecting The Right One

    Given today's threat landscape, combined with so many security options available today, it can be daunting when selecting new or alternative technologies to protect your business. Your security team has unique challenges; therefore, you should be asking your next security ...

MORE WEBINARS

Partner Perspectives

Security Experts & Hackers: We're Not So Different
Using the similarities among hackers and security programmers can be an advantage.

Doxing, DoS & Defacement: Today's Mainstream Hacktivism Tools
Anyone can get angry at you and become a hacktivist. Here's how to protect your organization from these increasingly common cyber attacks.

Compliance in the Cloud Needs To Be Continuous & Automated
Complex IT environments require timely visibility into risk and compliance.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.