Follow Dark Reading:
 June 30, 2017
LATEST SECURITY NEWS & COMMENTARY
Decrypting the Motivations Behind NotPetya/ExPetr/GoldenEye
Experts discuss the methods and targets involved in this week's massive malware outbreak to figure out what motivated attackers.
Kaspersky Lab Faces More U.S. Scrutiny Over Potential Russian Govt. Influence
Lawmaker proposes ban on DoD use of Moscow-based security vendor's products.
Hacking Factory Robot Arms for Sabotage, Fun & Profit
Black Hat talk will discuss how hackers could take over robotic arms, create micro-defects in products, and open up a new world of subtle blackmail.
IoT Vulns Draw Biggest Bug Bounty Payouts
As bug bounty programs become more popular outside of the technology sector, IoT vulnerabilities are yielding the highest payouts for bug hunters, according to two reports released Wednesday.
Why Enterprise Security Needs a New Focus
The WannaCry ransomware attack shows patching and perimeter defenses aren't enough. Enterprises should combine preventative measures with threat detection tactics.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Hot Hacking Tools to Come out of Black Hat USA
High-impact tools for white hats that will be revealed and released next month at Black Hat USA in Las Vegas.

Petya Or Not? Global Ransomware Outbreak Hits Europe's Industrial Sector, Thousands More
With echoes of WannaCry, infections spread fast. Some security researchers describe malware as variant of Petya; others say it's a brand new sample.

WannaCry Blame Game: Why Delayed Patching is Not the Problem
While post mortems about patching, updating, and backups have some value, the best preventative security controls are increased understanding and knowledge.

MORE
EDITORS CHOICE

9 Ways to Protect Your Cloud Environment from Ransomware
The same technology driving faster collaboration and data transfer also enables cybercriminals to quickly spread ransomware.
How To (And Not To) Make the Online Trust Honor Roll
Five websites generated the highest score in their sector for the 2017 Online Trust Audit & Honor Roll. Here is what it takes to get there and be listed among the Online Trust Alliance's Top 50
Tech Resources
ACCESS TECH LIBRARY NOW

  • Analytics 2017: What we Learned & What?s to Come

    At AllAnalytics, our editors have interviewed countless experts, attended numerous events (virtually and in person), and have tracked the news and opinion related to technology, analytics, artificial intelligence, and more. We've talked to CIOs, CTOs, data scientists, data analysts, recruiters, ...

  • How Cloud Can Help You Streamline Business Workflow

    In order to optimize your utilization of cloud computing, you need to be able to deliver reliable and scalable high performing application over your corporate network. Your business counterparts will expect you to provide network performance that can handle all ...

MORE WEBINARS

Partner Perspectives

Doxing, DoS & Defacement: Today's Mainstream Hacktivism Tools
Anyone can get angry at you and become a hacktivist. Here's how to protect your organization from these increasingly common cyber attacks.

Compliance in the Cloud Needs To Be Continuous & Automated
Complex IT environments require timely visibility into risk and compliance.

Talking Cyber-Risk with Executives
Explaining risk can be difficult since CISOs and execs don't speak the same language. The key is to tailor your message for the audience.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.