Follow Dark Reading:
 March 29, 2017
LATEST SECURITY NEWS & COMMENTARY
How Identity Deception Increases the Success of Ransomware
As scammers hone their skills, their handiwork looks more credible to intended victims, making a successful ransomware scam more likely.
Should Trump Tackle Air-Gapped Critical Infrastructure?
MIT experts issue recommendations to the president, urging him to take elements of the electric grid and gas pipeline offline - but other security experts say that ship has sailed.
Commercial IoT: Big Trouble in Small Devices
There are endless scenarios where hackers could wreak havoc on the industrial Internet of Things. There's also a readily available solution called 'HIP.'
1.4 Billion Data Records Exposed in 2016 Breaches
The number of data records breached soared in 2016 over the previous year, with the technology sector facing the brunt of the attacks.
Jail Time Set for Two More Members of Global Telecom Fraud Scheme
Ramon Batista and Farintong Calderon have been sentenced to 75 months and 36 months in prison, respectively.
Two Israeli Youths May Be Charged for vDOS Operation
Israeli authorities prepare to accuse two 18-year-olds for the online attack service, which caused $1.65 million in losses.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Steps to Transforming Yourself into a DevSecOps Rockstar
Security practitioners at one education software firm offer lessons learned from merging DevOps with security.

Windows 'DoubleAgent' Attack Turns AV Tools into Malware
Zero-day attack exploits a legitimate process in Windows, according to Cybellum; AV vendors downplay threat.

20 Million Mobile Devices at High Risk of Attack, Study Finds
Meanwhile, a separate report by Google says half of all Android devices didn't install a single security update in 2016.

MORE
SECURITY LIVE AT INTEROP ITX

MAY 15-19, 2017, MGM GRAND, LAS VEGAS

Check out all the sessions in the Interop Security Track. And don't forget about the two-day Dark Reading Cybersecurity Summit -- a great "what you need to know now" refresher for the overworked infosec pro or security crash course for the IT generalists in your life.


Tech Resources
ACCESS TECH LIBRARY NOW

  • NGES (Next Gen Endpoint Security): Tips & Key Considerations for Evaluating Solutions

    Next generation endpoint security (NGES) is one of the hottest topics in today's cybersecurity market, and for good reason. Traditional preventative measures alone offer insufficient endpoint protection - causing an influx of vendors offering NGES. While the market is relatively ...

  • How To Turn Your Data Into Dollars

    Organizations are swamped with data in the form of web traffic, ERP systems, CRM systems, point of sale data, and more. How do you turn that giant heap of data to an organized, integrated insight-generating machine? How do you turn ...

MORE WEBINARS

Partner Perspectives

Exploit Kits: Winter 2017 Review
We take another look at the current EK scene by going over RIG, Sundown, Neutrino and Magnitude.

Malware Explained: Packer, Crypter & Protector
These three techniques can protect malware from analysis. Here's how they work.

7 Things You Need to Know about Bayesian Spam Filtering
Knowing how spam filters work can clarify how some messages get through, and how your own emails can avoid being caught.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.