Follow Dark Reading:
 February 16, 2017
LATEST SECURITY NEWS & COMMENTARY
Russian-Speaking Rasputin Breaches Dozens Of Organizations
Attacker behind Election Assistance Commission hack now using SQL injection as his weapon of choice against universities and government agencies.
IoT Security: A Ways To Go, But Some Interim Steps For Safety
The Internet of Things remains vulnerable to botnets and malware, but Cisco's Anthony Grieco offers some tips to keep networks and users more secure
What To Do When All Malware Is Zero-Day
The industry needs new methods to fingerprint malware in order to determine who's behind breaches, and what can be done to stop them.
Microsoft Delays February Security Fixes
The company delayed its monthly Patch Tuesday update, which was supposed to replace detailed security bulletins with the "Security Updates Guide."
FBI's N-DEx System Helps Unearth Credit Card Fraud Ring
An intelligence analyst used the N-DEx system to discover a 16-member gang cheating liquor and cigarette stores across eight states.
MORE NEWS & COMMENTARY
HOT TOPICS
When Hackers Hack Hackers
Notable cases of internecine cyber squabbles.

CrowdStrike Fails In Bid To Stop NSS Labs From Publishing Test Results At RSA
NSS results are based on incomplete and materially incorrect data, CrowdStrike CEO George Kurtz says.

IBM Brings Watson Cognitive Computing To The SOC
Technology known for a Jeopardy stunt six years ago is now powering question answering within IBM Security's QRadar system.

MORE
EDITORS' CHOICE

Clinton Campaign Tested Staffers With Fake Phishing Emails
Campaign stressed good IT hygiene, according to manager Robby Mook, who said the fake phishing emails were used to gauge effectiveness of security training for staffers,
DARK READING VIDEOS FROM RSA

Deloitte Tackles Identity Management
At RSA Conference, Mike Wyatt, Managing Director of Deloitte Advisory Cyber Risk Service, discusses the identity management landscape and its growing importance, from "least privileges" to identity-as-a-service.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Cybersecurity] Costs vs. Benefits

    This online event, hosted by the editors of Dark Reading, brings together IT security leaders, business executives, and cyber threat experts will provide you with a holistic view of the costs and benefits of information security investments.

  • [Security] How to Better Arm Your Network Defenses

    BYOD policies and the enablement of global workforces to insecurely connect to your network has opened "Pandora's cyber box" to malicious attacks you worked hard to keep out. This fundamental shift limits your visibility into the threats that are targeting ...

MORE WEBINARS

Partner Perspectives

Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Three main threats companies aren't prepared to handle include outside attacks, data vulnerability and insider sabotage.

Meet 'Fruitfly:' Mac Malware Targeting Biomedical Research Centers
This newly discovered code contains indications that it has been circulating undetected for at least a couple years.

Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
When protecting physical or virtual endpoints, it's vital to have more than one layer of defense against malware.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.