Follow Dark Reading:
 June 24, 2016
LATEST SECURITY NEWS & COMMENTARY
Large Botnet Comes Back To Life -- With More Malware
The Necurs botnet associated with Dridex and Locky is back after three-week haitus.
Internet Of Things & The Platform Of Parenthood
A new father's musings on the problems with securing embedded systems, and why there are so few incentives for architecting trustworthy IoT technology from the ground up.
'Smart' Building Industry Mulls Cybersecurity Challenges
New 'attraction and curiosity' for infosec at the Intelligent Buildings Conference this week.
Carbonite Is Latest Victim Of Password Reuse Attack
Back-up services provider asks users to reset passwords, claims hackers used details from earlier breached websites.
Cyber Heist Probe: Bangladesh May End Contract With FireEye
Bangladesh Bank reportedly cites high cost as reason for possible termination of agreement.
MORE NEWS & COMMENTARY
HOT TOPICS
Ransomware, SCADA Access As a Service Emerging Threats For ICS Operators, Report Says
With attacks against industrial control networks increasing so too have the challenges, Booz Allen Hamilton says.

5 Tips For Staying Cyber-Secure On Your Summer Vacation
Stick with mobile payment apps and carrier networks when traveling. And don't broadcast your plans or locations via social media.

The Gamble Behind Cyber Threat Intelligence Sharing
In theory, sharing threat intel makes sense. But in cybersecurity you're not dealing with known individuals, you're dealing with anonymous adversaries capable of rapid change.

MORE
EDITORS' CHOICE

How To Lock Down So Ransomware Doesn't Lock You Out
Ransomware has mutated into many different forms - and it's not always easy to catch them all, but here are some things you can do.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Application Firewalls (WAFs) vs. Web Behavior Analytics

    This webinar discusses how the biggest problems to your web site aren't cross-site scripting and SQL injection attacks. The biggest problems are the ones you don't see: automated bots masquerading as real people browsing through web sites and mobile interfaces. ...

  • Analytics Talent: Find It. Use It. Retain It.

    This session will cover how organizations that are new to analytics or are expending their analytics initiatives can find analytics talent, including those in your existing employee base. Read more and register for this session >>

MORE WEBINARS

Partner Perspectives

Adaptive Security Demands A Shift In Mindset: Part 2 In A Series
By adopting new ways of thinking about security, improving the capabilities of existing systems, and integrating key innovations, enterprises will be well on their way to better security.

The Importance Of Taking A More Active Role To Protect Our Data
Big data has lots of potential to make our decisions more efficient and effective. But like any powerful substance, too much in the wrong hands can have disastrous consequences.

A Real World Analogy For Patterns of Attack
Patterns reveal exponentially more relevant information about attempted malfeasance than singular indicators of an attack ever could.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.