Follow Dark Reading:
 May 09, 2017
LATEST SECURITY NEWS & COMMENTARY
Google Ratchets Up OAuth Policies in Wake of Phishing Attacks
Google says it responded to the widespread Google Docs phishing campaign within one hour of detecting it.
Aflac CISO: Insurance Sector Ramps Up Cyber Defenses
Aflac CISO Tim Callahan discusses ongoing initiatives to stay secure as hackers ramp up attacks on financial services.
Why Cyber Attacks Will Continue until Prevention Becomes a Priority
Organizations must rethink their security measures. Focus on training, getting rid of old tech, and overcoming apathy.
DHS Report Outlines Feds' Mobile Security Threats
The US Department of Homeland Security sent Congress a study on mobile security threats facing federal government workers as well as recommendations for protection.
MORE NEWS & COMMENTARY
HOT TOPICS
Google Docs Phishing Scam a Game Changer
Experts expect copycats that take advantage of passive authentication from third-party applications using standards such as OAuth.

7 Steps to Fight Ransomware
Perpetrators are shifting to more specific targets. This means companies must strengthen their defenses, and these strategies can help.

Netflix Incident a Sign of Increase in Cyber Extortion Campaigns
Attackers using threats of data exposure and DDoS disruptions to try and extort ransoms from organizations.

MORE
EDITORS' CHOICE

Backdoors: When Good Intentions Go Bad
Requiring encrypted applications to provide backdoors for law enforcement will weaken security for everyone.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cyber-Attacks: Midsize Companies Think They're Safe - They Aren't

    Midsized companies are becoming an increasing hot spot for cyber-attacks. They face the same APTs and attacks as large enterprises, but have weaker defenses due to lack of resources and/or budgets. Weak defenses create not only the opportunity for ...

  • How Online Attackers Find Out About Your Organization

    Whether they are large or small, most targeted cyberattacks begin with some simple research on your organization. This process of collecting "open source intelligence" (OSINT) may include discovering employee information on e-mail or social networks, investigating your enterprise via sophisticated ...

MORE WEBINARS

Partner Perspectives

OSX.Bella: Mac Malware Strikes Again
This variant of the OSX.Dok dropper behaves altogether differently, and installs a completely different payload.

Locky Returns with a New (Borrowed) Distribution Method
A layered defense is a strong security posture for dealing with a threat like Locky, that can come in different disguises.

Cybercrime Tactics & Techniques: Q1 2017
A deep dive into the threats that got our attention during the first three months of the year - and what to expect going forward.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.