Follow Dark Reading:
 May 31, 2017
LATEST SECURITY NEWS & COMMENTARY
Cybercriminals Regularly Battle it Out on the Dark Web
People operating criminal services on Tor and other darknets attack each other frequently, a study by Trend Micro shows.
Bot-Driven Online Ad Fraud Losses Decline
But counterfeit ad inventory the next big worry for online advertisers.
Securing the Human a Full-Time Commitment
Encouraging the people in your organization to make safer cyber decisions requires dedicated brainpower to pull off, SANS study shows.
Cybercrime Costs to Reach $8 Trillion by 2022
Some 2.8 billion data records expected to be breached in 2017, according to a report released today by Juniper Research.
Securing IoT Devices Requires a Change in Thinking
There's no magic bullet for IoT security, but there are ways to help detect and mitigate problems.
Chipotle Dishes Details on Data Breach
An investigation into the Chipotle security incident announced April 25 confirmed a timeline of attack and type of customer information exposed.
MORE NEWS & COMMENTARY
HOT TOPICS
82% of Databases Left Unencrypted in Public Cloud
Personal health information and other sensitive data is left exposed as businesses overlook encryption and network security.

Split Tunnel SMTP Exploit Bypasses Email Security Gateways
Attackers can inject malicious payloads directly to email server via email encryption appliances, Securolytics says.

New Samba Bug Dangerous But No WannaCry
The administrators of the open-source Samba software have fixed a newly discovered vulnerability that lets attackers upload malicious files to vulnerable systems and servers.

MORE
EDITORS' CHOICE

8 Most Overlooked Security Threats
Businesses know the obvious security threats to watch for, but some of the biggest dangers may not at top-of-mind.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Adopting Cloud the Right Way

    Adopting a cloud mindset isn't about IT relinquishing all control and just approving invoices. It's about changing legacy ways of delivering business services and doing sales, customer service, and end user support in new and more flexible ways. We'll help ...

  • Free Yourself from Legacy Apps

    They've served their purpose years ago, but now they're stretching your IT budget and increasing security and compliance risks. Every enterprise has them, what are they? - Legacy applications. Don't get stuck between a rock and a hard place. Learn ...

MORE WEBINARS

Partner Perspectives

WanaCrypt0r Hits Worldwide
Consumers and businesses should be sure their Windows systems and software are updated with all current patches in order to stop the spread of this dangerous ransomware attack.

Malspam Causing Havoc for Mac & Windows
Spam is a multi-platform, multi-vector approach to network compromise, and organizations need to weigh up the risks on all fronts to be able to combat it successfully.

OSX.Bella: Mac Malware Strikes Again
This variant of the OSX.Dok dropper behaves altogether differently, and installs a completely different payload.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.