Follow Dark Reading:
 March 09, 2017
LATEST SECURITY NEWS & COMMENTARY
Fortune 1000 Companies See Security Ratings Drop
Fortune 1000 businesses report more breaches, and lower security performance, than their non-F1000 counterparts.
Researchers Find Multiple Critical Flaws In Confide Secure Messaging App
All flaws have been fixed, says maker of app purportedly used for secret communications by political operatives in DC.
In a Cybersecurity Vendor War, the End User Loses
When vulnerability information is disclosed without a patch available, users are the ones really being punished.
Why Printers Still Pose a Security Threat
Newly discovered security flaws in popular printers remind us how networked devices continue to put users at risk.
Trust, Cloud & the Quest for a Glass Wall around Security
In the next year, we're going to see a leap towards strategic, business-level objectives that can be resolved by simplifying infrastructure and granting greater visibility in real time.
MORE NEWS & COMMENTARY
HOT TOPICS
'Entire Hacking Capacity Of CIA' Dumped On Wikileaks, Site Claims
Leaked data tranche of 8,700 documents purportedly includes tools that turn smart TVs into covert surveillance devices.

Attackers Employ Sneaky New Method to Control Trojans
A new malware sample shows threat actors have begun using DNS TXT record and queries for C2 communications, Cisco Talos says,

Threats Converge: IoT Meets Ransomware
Ransomware is already a problem. The Internet of Things has had a number of security issues. What happens when the two combine?

MORE
EDITORS' CHOICE

7 Hot Security Terms (and Buzzwords) to Know
How the security industry has a conversation with itself is constantly changing and the latest terms as well as buzzwords point us to where the technology is heading.
Black Hat Asia 2017: Securing Mobile Devices
Opportunities for phishing, ransomware, cryptocurrency mining and other attacks are endless. Understanding mechanisms for compromising Android and iOS systems is crucial to detecting and preventing security breaches.
Tech Resources
ACCESS TECH LIBRARY NOW

  • WANTED: Data Analysts, but are there enough?

    As the internet and availability of data has disrupted many industries, one career field that continues to experience high demand is data analytics. Organizations that are looking to get value out of their data and compete in a new economy ...

  • [Ransomware] Remediation & Recovery

    You've been hit by ransomware - and hit hard. Your organization has decided it won't give in to the attackers' demands for a ransom. Now what?

MORE WEBINARS

Partner Perspectives

4 Ways to Recover from a Cyberattack
Be prepared and act quickly are two key steps that will help you bounce back quickly from a cyberattack.

Adware vs. Ad Fraud: Viva la Difference!
Both earn their money in the advertising trade but they each have very different means of operation and targets.

DNSSEC: Why Do We Need It?
The number of signed domain names has grown considerably over the past two and a half years but some sectors are heavily lagging behind.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.