Follow Dark Reading:
 June 23, 2016
LATEST SECURITY NEWS & COMMENTARY
Guccifer 2.0: Red Herring Or Third DNC Hacker?
CrowdStrike and Fidelis say all evidence for intrusions at DNC points to Russian-backed groups.
'Bug Poachers:' A New Breed of Cybercriminal
As if security researchers don't have enough to worry about, we now have to contend with extortionists who take advantage of the well-established fact that applications are a ripe target for exploitation.
China Still Successfully Hacking US, But Less
New FireEye report shows significant decline in the number of Chinese cyber espionage attacks on the US since 2014, but China has definitely not stopped the intellectual property theft.
'Hack The Pentagon' Paid 117 Hackers Who Found Bugs In DoD Websites
Defense Department's historic bug bounty pilot yields 138 valid reports of vulnerabilities, most of which were fixed within two days.
Ransomware, SCADA Access As a Service Emerging Threats For ICS Operators, Report Says
With attacks against industrial control networks increasing so too have the challenges, Booz Allen Hamilton says.
MORE NEWS & COMMENTARY
HOT TOPICS
Windows 'BadTunnel' Attack Hijacks Network Traffic
Newly discovered -- and now patched -- Windows design flaw affects all versions of Windows.

Phishing, Whaling & The Surprising Importance Of Privileged Users
By bagging a privileged user early on, attackers can move from entry point to mission accomplished in no time at all.

Cartoon: Internet of Things Meets Tech Support

John Klossner takes us on a trip back to the future.

MORE
EDITORS' CHOICE

How To Lock Down So Ransomware Doesn't Lock You Out
Ransomware has mutated into many different forms - and it's not always easy to catch them all, but here are some things you can do.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Analytics 101: Creating an Analytically Driven Organization

    This session will cover what you need to consider to get an analytics program up and running. Read more and register for this session >>

  • Mobile Threats & How to Keep Them at Bay

    With savvy cybercriminals using vulnerabilities in apps, networks, and operating systems to gain control of mobile devices, businesses need security that integrates with existing systems for continuous protection. Learn how to better protect your business from mobile threats by attending ...

MORE WEBINARS
FEATURED REPORTS
  • Gartner Predictions for 2016: Mobile and Wireless

    In this new phase of mobility, wireless and mobile technologies expand our real world beyond simple smart devices, creating new digital worlds. IT leaders and vendors are challenged by new privacy and security threats from new technology sources.

  • Forrester Report: Cloud Powers The New Connected Economy

    This May 2016 Forrester report explores a landscape in which organizations in every industry are moving forward from cloud adoption to cloud creation and participation. Learn how you are a member of this networked economy & how the steps you take may ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.