Follow Dark Reading:
 April 06, 2017
LATEST SECURITY NEWS & COMMENTARY
Matching Wits with a North Korea-Linked Hacking Group
Skilled 'Bluenoroff' arm of infamous Lazarus hacking team behind Bangladesh Bank heist and Sony attacks actively resists investigators on its trail, Kaspersky Lab says.
Businesses Hit by More W-2 Fraud as Cybercriminals Shift Tax Season Targets
Businesses, not individuals, are more frequently targeted with scams as cybercriminals try to cash in on tax season.
GDPR Doesn't Need to be GDP-Argh!
These 10 steps will ease the pain of compliance with the General Data Protection Regulation, the EU's new privacy law that goes into effect in a little over a year.
Banks Must Focus More on Cyber-Risk
Recent guidelines from the Federal Reserve are aimed at stemming the tide of successful exploits.
Web Inventor Slams US-UK Internet Plans, Cites Privacy Concerns
Sir Tim Berners-Lee, recipient of the Turing Award, criticizes moves to undermine encryption and promises to fight for net neutrality.
Chinese APT10 Hacking Group Suspected of Global Campaign Targeting MSPs
'Operation Cloud Hopper' reveals China-based attackers allegedly targeted IT service providers in 15 countries.
MORE NEWS & COMMENTARY
HOT TOPICS
Cybercriminals Seized Control of Brazilian Bank for 5 Hours
Sophisticated heist compromised major bank's entire DNS infrastructure.

US Border Policy Shifts May Drive Changes in Laptop Security
In-cabin laptop ban and requirements to unlock devices for border patrol could have enterprises revisiting their on-device data policies.

Customized Malware: Confronting an Invisible Threat
Hackers are gaining entry to networks through a targeted approach. It takes a rigorous defense to keep them out.

MORE
SECURITY LIVE AT INTEROP ITX

Keynote: Andrew McAfee, Principal Research Scientist, MIT

And be sure to check out the two-day Dark Reading Cybersecurity Crash Course May 15 & 16, where Dark Reading editors and some of the industry's top cybersecurity experts will share the latest data security trends and best practices.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Threat Intelligence: Fight Threats, Not Logs

    How to operationalize threat intelligence for protection & prevention More is not always better. When it comes to data and threat intelligence, better prevention is offered via the right approach. Don't waste your resources by drowning them in a sea of ...

  • WANTED: Data Analysts, but are there enough?

    As the internet and availability of data has disrupted many industries, one career field that continues to experience high demand is data analytics. Organizations that are looking to get value out of their data and compete in a new economy ...

MORE WEBINARS

Partner Perspectives

Top 5 Dumbest Cyber Threats That Still Pay Off
Some hackers are fairly predictable in their successful use of really dumb attacks.

Exploit Kits: Winter 2017 Review
We take another look at the current EK scene by going over RIG, Sundown, Neutrino and Magnitude.

Malware Explained: Packer, Crypter & Protector
These three techniques can protect malware from analysis. Here's how they work.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.