Follow Dark Reading:
 April 20, 2017
LATEST SECURITY NEWS & COMMENTARY
Cybercriminals Mostly Prefer Skype Messaging
But cybercrime gangs worldwide are increasingly using encrypted peer-to-peer chat platforms for their communications outside online underground forums, new study finds.
Google Won't Trust Symantec and Neither Should You
As bad as this controversy is for Symantec, the real damage will befall the company and individual web sites deemed untrustworthy by a Chrome browser on the basis of a rejected Symantec certificate.
Snowden Says Mass Surveillance Programs 'Are About Power'
Edward Snowden shared his views of the implications of mass surveillance programs and the government's objective in implementing them.
3 Tips for Updating an Endpoint Security Strategy
How to face the process of navigating new threats, tools, and features to build an effective endpoint security strategy.
The Architecture of the Web Is Unsafe for Today's World
The Internet is based on protocols that assume content is secure. A new, more realistic model is needed.
InterContinental Hotels Group Breach Checks In at 1,200 Locations
IHG franchises in its Americas region were hit with a point-of-sale malware breach, affecting 1,200 hotels ranging from its Crowne Plaza to Holiday Inn Express.
ISC2 Issues White House Cybersecurity Executive Order Recommendations
The industry trade group calls on President Trump to make workforce development a top priority when he issues the final version of the White House cybersecurity executive order.
MORE NEWS & COMMENTARY
HOT TOPICS
Health Savings Account Fraud: The Rapidly Growing Threat
As income tax season comes to a close, financially-motivated cybercriminals are honing new tactics for monetizing medical PII.

95% of Organizations Have Employees Seeking to Bypass Security Controls
Use of TOR, private VPNs on the rise in enterprises, Dtex report shows.

New Breed of DDoS Attack On the Rise
Akamai Networks since October has detected and mitigated at least 50 DDoS attacks using Connectionless LDAP.

MORE
APPLICATION SECURITY TWEETFEST TODAY!

Join Dark Reading for a 4/20 Twitter Chat on AppSec
The @DarkReading team will host a conversation about application security on 4/20 at 2 p.m. ET.
SECURITY LIVE AT INTEROP ITX

10 Questions To Get Practical Answers At Interop ITX
May 15-19 in Las Vegas: How to get solutions and advice from top speakers for the things that you really want to know.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Get Control Over Your Data Quality/Data Governance

    AllAnalytics' year-end online poll asking about 2017 goals revealed that your top priority this year is around data quality and data trust. How is your data quality program measuring up so far this year? Attend this radio show and find out!

  • Becoming a Threat Hunter in Your Enterprise

    You're tired of waiting. Tired of waiting for your technology to alert you that there's already a problem. You want to be more proactive, sink your hands into those threat intelligence feeds, dig into those behavioral analytics reports, follow one ...

MORE WEBINARS

Partner Perspectives

Cybercrime Tactics & Techniques: Q1 2017
A deep dive into the threats that got our attention during the first three months of the year - and what to expect going forward.

Securing your Privacy on Android
If you work at a company that allows you to use your mobile device to login to email, access company data, or connect to company Wi-Fi, you're more of a security risk than you think.

Top 5 Dumbest Cyber Threats That Still Pay Off
Some hackers are fairly predictable in their successful use of really dumb attacks.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.