Follow Dark Reading:
 September 29, 2016
LATEST SECURITY NEWS & COMMENTARY
A Bug Bounty Reality-Check
New study shows that bug bounties without a secure application development program and testing can be costly.
Clinton, Trump Debate 'Twenty-First Century War' Of Cyberattacks
Lester Holt led with topic of cybersecurity as the first question on national security in Monday's Presidential debate.
Hacking The Polls: Where US Voting Processes Fall Short
The patchwork of 50 decentralized state electoral systems threatens to disrupt our national election through ransomware attacks, hijacked voter registration rolls, and altered voting results.
Spam Levels Spike, Thanks In Part To Ransomware
By shipping banking Trojans and ransomware that turn big profits fast, spammers can now afford the high overhead of high-volume spam campaigns.
Mobile Fraud Changes Outlook for Multifactor Authentication
SMS one-time passcodes just won't cut it anymore. We need new approaches that people will actually use.
Biometric Skimmers Pose Emerging Threat To ATMs
Even as financial institutions move to shore up ATM security with biometric mechanisms, cybercrooks are busy figuring out ways to beat them.
Improving The Security Conversation For CIOs, CISOs, & Board Members
Cybersecurity is a top priority among enterprise leaders, but it's difficult for them to communicate with IT and security teams if they lack an understanding of key security concepts.
MORE NEWS & COMMENTARY
HOT TOPICS
Yahoo Reveals Nation State-Borne Data Breach Affecting A Half-Billion Users
But still unconfirmed is whether the newly revealed attack is related to recently dumped Yahoo user credentials in an online cybercrime forum.

Russian 'Fancy Bear' Hackers Hit Mac OS X With New Trojan
Aerospace victim hit by targeted attack that didn't even exploit a Mac vulnerability.

Snowden: Hollywood Highlights 2 Persistent Privacy Threats
Oliver Stone's movie shows us that while most of us have nothing to hide, we all have information worth protecting - both technically and constitutionally.

MORE
FEATURED VIDEO FROM DARK READING NEWS DESK AT BLACK HAT


Bad Boys, Whatcha Gonna Do When They Come For You?
A Black Hat News Desk discussion with Shehzad Merchant of Gigamon.

EDITORS' CHOICE

25 Emerging Security Vendors To Watch
A wave of companies is entering the security field armed with technologies to help businesses mitigate the next generation of cyberattacks. Who are these emerging vendors and what can they offer?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Less Staff + More Security Needs = Better Incident Response

    In this webinar on September 28th, Duane Kuroda will shine a light on this problem and provide best practices to help you take charge. Results of a just-completed survey of your peers about the state of the problem will be ...

  • How To Effectively Analyze Threat Intelligence Data

    Today's enterprises have a wide variety of threat intelligence available to them: threat feeds, internal security event information, CERT and other vulnerability reporting sites. How can you correlate this information to identify sophisticated cyberattacks? What processes can you use to ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.