Follow Dark Reading:
 January 17, 2018
LATEST SECURITY NEWS & COMMENTARY
Kaspersky Lab Warns of Extremely Sophisticated Android Spyware Tool
Skygofree appears to have been developed for lawful intercept, offensive surveillance purposes.
Most Common Exploits of 2017 in Microsoft Office, Windows
The most common exploit affects Microsoft Office and has been used by attackers in North Korea, China, and Iran.
Researchers Offer 'a VirusTotal' for ICS
Free online sandbox, honeypot tool simulates a real-world industrial network environment.
In Security & Life, Busy Is Not a Badge of Honor
All security teams are busy, but not all security teams are productive. The difference between the two is huge.
1 in 9 Online Accounts Created in 2017 Was Fraudulent
Account takeovers hot, stolen credit cards not.
Four Malicious Google Chrome Extensions Affect 500K Users
ICEBRG Security Research team's finding highlights an often-overlooked threat.
MORE NEWS & COMMENTARY
HOT TOPICS
CISOs' No. 1 Concern in 2018: The Talent Gap
Survey finds 'lack of competent in-house staff' outranks all other forms of cybersecurity worry, including data breaches to ransomware attacks.

Responding to the Rise of Fileless Attacks
Fileless attacks, easier to conduct and more effective than traditional malware-based threats, pose a growing challenge to enterprise targets.

How to Attract More Women Into Cybersecurity - Now
A recent survey finds a number of attributes women seek in their careers can be found in a cybersecurity profession - the dots just need to be connected.

MORE
EDITORS' CHOICE

Doh!!! The 10 Most Overlooked Security Tasks
Here's a list of gotchas that often slip past overburdened security pros.
Mental Models & Security: Thinking Like a Hacker
These seven approaches can change the way you tackle problems.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Top 3 Pitfalls of Securing the Decentralized Enterprise
Doubling down on outdated security practices while the number of users leveraging your enterprise network grows is a race to the bottom for businesses moving to distributed workflows.

Why Facebook Security Questions Are no Substitute for MFA
If identity is established based on one thing you know and one thing you have, the latter should not also be a thing you know because in the sharing economy, we share everything.

Be a More Effective CISO by Aligning Security to the Business
These five steps will you help marshal the internal resources you need to reduce risk, break down barriers, and thwart cyber attacks.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.