Follow Dark Reading:
 February 05, 2018
LATEST SECURITY NEWS & COMMENTARY
IoT Botnets by the Numbers
IoT devices are a botherder's dream attack-vector.
APIs Pose 'Mushrooming' Security Risk
As APIs grow in prominence, top security concerns include bots and authentication.
3 Ways Hackers Steal Your Company's Mobile Data
The most effective data exfiltration prevention strategies are those that are as rigorous in vetting traffic entering the network as they are traffic leaving it.
Cyberattack Impersonates FBI Internet Crime Complaint Center
Threat actors trick victims into sharing personal information with fake IC3 messages laced with malware.
Russian National Arrested for Kelihos Botnet Sent to US
Peter Levashov, among the world's most notorious email spammers, has been extradited to the US.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Issues Emergency Patch to Disable Intel's Broken Spectre Fix
Affected Windows systems can also be set to "disable" or "enable" the Intel microcode update for Spectre attacks.

Thinking about a Career Move in Cybersecurity?
The numbers show career opportunities for cyber defenders.

DNS Hijacking: The Silent Threat That's Putting Your Network at Risk
The technique is easy to carry out and can cause much damage. Here's what you need to know about fighting back.

MORE
EDITORS' CHOICE

6 Tips for Building a Data Privacy Culture
Experts say it's not enough to just post data classification guidelines and revisit the topic once a year. Companies have to build in privacy by design.
Digital Extortion to Expand Beyond Ransomware
In the future of digital extortion, ransomware isn't the only weapon, and database files and servers won't be the only targets.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Ramnit's Holiday Shopping Spree: Retailers & E-commerce
This past season, the authors of a traditional banking Trojan focused on what people do between Thanksgiving and New Year's Day: shop, eat, check their bank account, and entertain.

Data Encryption: 4 Common Pitfalls
To maximize encryption effectiveness you must minimize adverse effects in network performance and complexity. Here's how.

Selling Cloud-Based Cybersecurity to a Skeptic
When it comes to security, organizations don't need to look at cloud as an either/or proposition. But there are misconceptions that need to be addressed.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.