Follow Dark Reading:
 November 30, 2016
LATEST SECURITY NEWS & COMMENTARY
Deutsche Telekom Attacks Suggest Mirai Threat Poised To Become Much Larger
With attack, Mirai has added an exploit targeting Web service vulnerability.
Retailers Limit Data Access For Temporary, Seasonal Workers
Employers are scaling back on sensitive data access for temporary and contract employees, and increasing visibility into their online activity.
European Commission Hit By DDoS Attack
The cyberattack lasted for several hours and affected output but no loss of data was reported.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Books Security Pros Should Read
Hunting for a good resource on the security industry? Check out these classics from the experts to learn more about hacking, defense, cryptography and more.

German Telco Probes Possible Hack Of 900,000 Customers
Network outages bring down services of many Deutsche Telekom customers raising suspicion that external parties may be involved.

MORE
EDITOR'S CHOICE

Cybersecurity User Training that Sticks: 3 Steps
People are eager for common-sense advice that gives them control over their environment and helps them stay safe online.
2016's 7 Worst DDoS Attacks So Far
Rise of booter and stresser services, mostly run on IoT botnets, is fueling DDoS excitement (but the pros aren't impressed).
Tech Resources
ACCESS TECH LIBRARY NOW

  • Why the IoT Matters to Your Business

    Set aside your opinions about some of the frivolous and risky applications that you think of when you hear the term Internet of Things. The fact is that the IoT is real. It's a concept that businesses in many sectors ...

  • Containerized Apps - Changing Security

    With continuous deployment of micro-services and Docker containers becoming mainstream, it's imperative that security initiatives include security scanning and monitoring. Increasingly, known open source vulnerabilities have been the "way in" for attackers. This is a major concern for organizations worldwide ...

MORE WEBINARS

Partner Perspectives

Beware: Scalable Vector Graphics Files Are A New Ransomware Threat
SVG files offer many advantages as far as graphics go, but hackers looking to embed malware on websites can exploit them.

5 Links Of The Attack Chain And How To Disrupt Them
By identifying steps in the attack chain, you can deploy appropriate defenses at each stage to prevent breaches from happening in the first place.

Active Defense Framework Can Help Businesses Defend Against Cyberattacks
New report provides a framework that lets private sector entities defend themselves while at the same time protect individual liberties and privacy, and mitigate the risk of collateral damage.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.