Follow Dark Reading:
 November 19, 2016
LATEST SECURITY NEWS & COMMENTARY
Cyber Monday, Consumers & The Bottom Line Of A Data Beach
Yes retailers can achieve ROI for their investments in cybersecurity during the upcoming holiday season --and for the rest of the year, too! Here's how.
Thinking Ahead: Cybersecurity In The Trump Era
In a panel held by the University of California Berkeley Center for Long-Term Cybersecurity and Bipartisan Policy Center, experts discuss challenges facing the incoming presidential administration.
NSA Chief Says DNC Email Leak Was Deliberate Act
Attack was a conscious effort to achieve a specific effect, Director Michael Rogers told the Wall Street Journal this week.
China's Jinping Opens Tech Meet With Calls For 'Fair & Equitable' Internet
The third Wuzhen World Internet Conference had a strong presence of US tech companies despite criticism of China's Internet laws.
Teenager Admits To TalkTalk Hack
A 17-year-old boy exploited flaws in ISP's web pages to steal confidential data of 150,000 customers.
MORE NEWS & COMMENTARY
HOT TOPICS
How To 'PoisonTap' A Locked Computer Using A $5 Raspberry Pi
White hat hacker Samy Kamkar has come up with a way of to hijack Internet traffics from a password-protected computer.

Insider Threat: The Domestic Cyber Terrorist
It is dangerously naive for business and government leaders to dismiss the risk of radicalized privileged users inside our critical industries.

Firmware Secretly Sent Text, Call Data On Android Users To China
Several Android models sold in the US likely impacted, says Kryptowire

MORE
EDITORS' CHOICE

8 Public Sources Holding 'Private' Information
Personal information used for nefarious purposes can be found all over the web - from genealogy sites to public records and social media.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Will Data & Humans Become Friends in 2017?

    Is data reaching a saturation point, or still in its infancy? Has data buried human experience in our decision process? How will the millennial generation's love of data impact business as more millennials move into management roles? Can we expect ...

  • Spearphishing & Targeted Social Engineering Attacks On Your Users

    In this eye-opening webinar, top experts on phishing and social engineering will discuss the motives and methods that attackers use to execute these targeted "spearphishing" attacks. You'll get insight on how the attackers choose their social engineering targets, the methods ...

MORE WEBINARS

Partner Perspectives

Active Defense Framework Can Help Businesses Defend Against Cyberattacks
New report provides a framework that lets private sector entities defend themselves while at the same time protect individual liberties and privacy, and mitigate the risk of collateral damage.

8 Ways Businesses Can Better Secure Their Remote Workers
Remote workers may present challenges for IT staff, but a combination of cybersecurity best practices, strong policy, and a dedicated user awareness campaign could keep company data safe.

Every Minute Of Security Planning Will Save You 10 Minutes In Execution
Leveraging automation, orchestration, and interoperability in your cybersecurity plans now will save you significant time later.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.