Follow Dark Reading:
 April 22, 2017
LATEST SECURITY NEWS & COMMENTARY
Exploits Targeting Corporate Users Surged Nearly 30% In 2016
At same time, number of attacks targeting software vulnerabilities in systems used by consumers declined over 20%, Kaspersky Lab says in new report.
Machine Learning in Security: 4 Factors to Consider
Key factors to consider before adding machine learning to your security strategy.
The Hidden Dangers of Component Vulnerabilities
Dangerous flaws in open source components and dependencies lurk within most applications today.
Best Practices for Securing Open Source Code
Attackers see open source components as an obvious target because there's so much information on how to exploit them. These best practices will help keep you safer.
Android Geo-Location Spyware Installed By Up To 5 Million Users
SMSVova, disguised itself as a system update app and duped between 1 million and 5 million users into downloading it from the Google Play store.
Nigerian Convicted in Passport Wire Fraud and Internet Scam
A Nigerian man set up a number of U.S. bank accounts with bogus passports over a one year period, in which he managed to steal at least $500,000 through wire fraud and Internet scams.
MORE NEWS & COMMENTARY
HOT TOPICS
Health Savings Account Fraud: The Rapidly Growing Threat
As income tax season comes to a close, financially-motivated cybercriminals are honing new tactics for monetizing medical PII.

95% of Organizations Have Employees Seeking to Bypass Security Controls
Use of TOR, private VPNs on the rise in enterprises, Dtex report shows.

Cybercriminals Mostly Prefer Skype Messaging
But cybercrime gangs worldwide are increasingly using encrypted peer-to-peer chat platforms for their communications outside online underground forums, new study finds.

MORE
EDITORS' CHOICE

6 Times Hollywood Got Security Right
Hollywood has struggled to portray cybersecurity in a realistic and engaging way. Here are films and TV shows where it succeeded.
Tech Resources
ACCESS TECH LIBRARY NOW

  • IT Leader's Guide to the Cybersecurity Landscape

    Thanks to a never-ending stream of major and well-publicized data breaches, security has become one of the most critical issues in IT. Attend this webinar to learn about chief threats that IT organizations face, how they can impact your systems ...

  • Sneak Peek: State of Analytics - Research Results Revealed

    How does your analytics initiative shape up? Are you keeping pace with your peers in other organizations? Do you have data scientists in lead roles? Are you driving innovation with data? Have you embarked on Internet of Things (IoT) projects? ...

MORE WEBINARS

Partner Perspectives

Cybercrime Tactics & Techniques: Q1 2017
A deep dive into the threats that got our attention during the first three months of the year - and what to expect going forward.

Securing your Privacy on Android
If you work at a company that allows you to use your mobile device to login to email, access company data, or connect to company Wi-Fi, you're more of a security risk than you think.

Top 5 Dumbest Cyber Threats That Still Pay Off
Some hackers are fairly predictable in their successful use of really dumb attacks.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.