Follow Dark Reading:
 February 10, 2018
LATEST SECURITY NEWS & COMMENTARY
Google Paid $2.9M for Vulnerabilities in 2017
The Google Vulnerability Reward Program issued a total of 1,230 rewards in 2017. The single largest payout was $112,500.
Cyber Warranties: What to Know, What to Ask
The drivers and details behind the growth of cyber warranties, which more businesses are using to guarantee their products.
Back to Basics: AI Isn't the Answer to What Ails Us in Cyber
The irony behind just about every headline-grabbing data breach we've seen in recent years is that they all could have been prevented with simple cyber hygiene.
Russian Authorities Arrest Engineers for Cryptocurrency Mining at Nuclear Weapons Site
The nuclear weapons facility employees reportedly tried to mine cryptocurrency via a supercomputer.
Sacramento Bee Databases Hit with Ransomware Attack
The Bee did not pay ransom and deleted its databases to prevent future attacks, according to its publisher.
MORE NEWS & COMMENTARY
HOT TOPICS
New Zero-Day Ransomware Evades Microsoft, Google Cloud Malware Detection
Shurl0ckr, a form of Gojdue ransomware, was not detected on SharePoint or Google Drive.

New POS Malware Steals Data via DNS Traffic
UDPoS is disguised to appear like a LogMeIn service pack, Forcepoint says.

2017 Smashed World's Records for Most Data Breaches, Exposed Information
Five mega-breaches last year accounted for more than 72% of all data records exposed in 2017.

MORE
EDITORS' CHOICE

8 Nation-State Hacking Groups to Watch in 2018
The aliases, geographies, famous attacks, and behaviors of some of the most prolific threat groups.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Your Identity-aware Infrastructure

    Join Darran Rolls, the CTO & CISO of SailPoint, the leader in the Gartner Magic Quadrant for Identity Governance and Administration, as he demonstrates how to build an identity-aware infrastructure.

  • Strategies for Monitoring & Measuring Cloud Security

    In this Dark Reading webinar, a top expert offers a look at practices and tools that will help your team monitor security in IT environments that incorporate many cloud applications and services.

MORE WEBINARS

Partner Perspectives

BrickerBot: Internet Vigilantism Ends Don't Justify the Means
However noble the intention, obtaining unauthorized access to devices and making them unusable is illegal and undermines the work of ethical researchers.

Top Cloud Security Misconceptions Plaguing Enterprises
Contrary to popular opinion, there is no one single cloud. There are a wealth of cloud-based providers that own dedicated server space across the globe. Here's how to find the best fit for your company.

Ramnit's Holiday Shopping Spree: Retailers & E-commerce
This past season, the authors of a traditional banking Trojan focused on what people do between Thanksgiving and New Year's Day: shop, eat, check their bank account, and entertain.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.