Follow Dark Reading:
 September 29, 2016
LATEST SECURITY NEWS & COMMENTARY
Hacking The Polls: Where US Voting Processes Fall Short
The patchwork of 50 decentralized state electoral systems threatens to disrupt our national election through ransomware attacks, hijacked voter registration rolls, and altered voting results.
Russian Hackers Target Citizen Journalists Reporting On Malaysian Airlines Crash
Bellingcat's reporters have been hit with spear phishing attacks and account takeover attempts for over a year, ThreatConnect says.
FBI Probes Bid To Hack Democratic Party Officials' Phones, Sources Say
Russia-backed criminals again likely to be behind this hacking which, if proven, could involve theft of sensitive data, say the sources.
Improving Security Savvy Of Execs And Board Room
Jeff Welgan describes how best to improve cybersecurity literacy throughout the C-suite.
The Real Reasons Why Users Stink At Passwords
Personality, denial, and authentication-overload are big factors, new study finds.
More Than Half Of IT Pros Employ Insecure Data Wiping Methods
Recent study shows most enterprise IT professionals incorrectly believe emptying a Recycle Bin or reformatting a computer drive permanently erases data.
Microsoft Launches Cloud-Based Fuzzing
'Project Springfield' debuts at Ignite conference.
SWIFT Toughens Customer Security With New Mandatory Rules
Measures to include set of core safety standards and assurance framework requiring annual self-attestation by SWIFT members.
MORE NEWS & COMMENTARY
HOT TOPICS
Russian 'Fancy Bear' Hackers Hit Mac OS X With New Trojan
Aerospace victim hit by targeted attack that didn't even exploit a Mac vulnerability.

7 New Rules For IoT Safety & Vuln Disclosure
In the Internet of Things, even the lowliest smart device can be used for a malicious purpose. Manufacturers take heed!

MORE
FEATURED VIDEO FROM DARK READING NEWS DESK AT BLACK HAT


Making The Dark Web Less Scary
Lance James, chief scientist at Flashpoint, stops by the Dark Reading News Desk to share his thoughts about the Dark Web.

EDITORS' CHOICE

25 Emerging Security Vendors To Watch
A wave of companies is entering the security field armed with technologies to help businesses mitigate the next generation of cyberattacks. Who are these emerging vendors and what can they offer?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Less Staff + More Security Needs = Better Incident Response

    In this webinar on September 28th, Duane Kuroda will shine a light on this problem and provide best practices to help you take charge. Results of a just-completed survey of your peers about the state of the problem will be ...

  • How To Effectively Analyze Threat Intelligence Data

    Today's enterprises have a wide variety of threat intelligence available to them: threat feeds, internal security event information, CERT and other vulnerability reporting sites. How can you correlate this information to identify sophisticated cyberattacks? What processes can you use to ...

MORE WEBINARS

Partner Perspectives

'Beep' Prepared: How Security Economics Can Help The Coyote Catch The Roadrunner
The practice of security economics demonstrates how gaps in the security architecture impair business results.

Sharing Cybersecurity Threat Intelligence Is The Only Way We Win
Security organizations must leverage each other's information in order to better predict, prevent, detect, and respond to threats their customers and organizations face.

Ransomware: Coming To A Hospital Near You?
10 ways to protect healthcare systems from ransomware and other malware infections.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.