Follow Dark Reading:
 January 31, 2018
LATEST SECURITY NEWS & COMMENTARY
Digital Extortion to Expand Beyond Ransomware
In the future of digital extortion, ransomware isn't the only weapon, and database files and servers won't be the only targets.
Phishing Campaign Underscores Threat from Low Budget, Low Skilled Attackers
For just over $1,000, a phishing operation successfully spied on members of the Tibetan community for 19 months, Toronto University's Citizen Lab found.
DNS Hijacking: The Silent Threat That's Putting Your Network at Risk
The technique is easy to carry out and can cause much damage. Here's what you need to know about fighting back.
Hack Costs Coincheck Cryptocurrency Exchange $530 Million
Losses at Japanese exchange Coincheck surpass those of the Mt. Gox Bitcoin exchange hack in 2014, and may be largest-ever cryptocurrency theft.
Breach-Proofing Your Data in a GDPR World
Here are six key measures for enterprises to prioritize over the next few months.
MORE NEWS & COMMENTARY
HOT TOPICS
This Year's Pwn2Own Hackfest Will Offer Up to $2 Million in Rewards
Microsoft is a partner at annual contest for the first time.

Microsoft Issues Emergency Patch to Disable Intel's Broken Spectre Fix
Affected Windows systems can also be set to "disable" or "enable" the Intel microcode update for Spectre attacks.

Meltdown & Spectre: Computing's 'Unsafe at Any Speed' Problem
Ralph Nader's book shook up the automotive world over 50 years ago. It's time to take a similar look at computer security.

MORE
EDITORS' CHOICE

6 Tips for Building a Data Privacy Culture
Experts say it's not enough to just post data classification guidelines and revisit the topic once a year. Companies have to build in privacy by design.
An Action Plan to Fill the Information Security Workforce Gap
Nothing says #whorunstheworld like an all-female blue team taking down a male-dominated red team in a battle to protect sensitive customer data, and other ideas to entice women into a cyber career.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Strategies for Monitoring & Measuring Cloud Security

    In this Dark Reading webinar, a top expert offers a look at practices and tools that will help your team monitor security in IT environments that incorporate many cloud applications and services.

  • Making Data Governance Really Work

    In this webinar, you'll learn how organizations such as yours can enable data governance programs, including how to overcome barriers to success. We'll offer recommendations on the measures you can take to fast-track your data governance program, whether you're just ...

MORE WEBINARS

Partner Perspectives

Selling Cloud-Based Cybersecurity to a Skeptic
When it comes to security, organizations don't need to look at cloud as an either/or proposition. But there are misconceptions that need to be addressed.

Avoiding the Epidemic of Hospital Hacks
Lessons learned about cyber hygiene from inside one of America's highest ranked medical institutions.

Applying Defense-in-Depth to the Digital Battlefield
How a layered security strategy can minimize the threat and impact of a data breach.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.