Follow Dark Reading:
 August 03, 2017
LATEST SECURITY NEWS & COMMENTARY
Microsoft Security Put to the Test at Black Hat, DEF CON
Researchers at both conferences demonstrated workarounds and flaws in applications and services including Office 365, PowerShell, Windows 10, Active Directory and Windows BITs.
Iranian Hackers Ensnared Targets via Phony Female Photographer
US, Indian, Saudi Arabian, Israeli, Iraqi IT, security, executives in oil/gas and aerospace swept up in elaborate social media ruse used for cyber espionage operations.
Anthem Hit with Data Breach of 18,580 Medicare Members
Third-party service provider for the insurer discovered one of its employees allegedly engaged in identity theft of thousands of Anthem Medicare members.
DEF CON Rocks the Vote with Live Machine Hacking
Jeff Moss, founder of the hacker conference, is planning to host a full-blown election and voting system for hacking in 2018 at DEF CON, complete with a simulated presidential race.
MORE NEWS & COMMENTARY
HOT TOPICS
Throw Out the Playbooks to Win at Incident Response
Four reasons why enterprises that rely on playbooks give hackers an advantage.

Digital Crime-Fighting: The Evolving Role of Law Enforcement
Law enforcement, even on a local level, has a new obligation to establish an effective framework for combating online crime.

MORE
In Case You Missed It

Ransomware Attack on Merck Caused Widespread Disruption to Operations
Pharmaceutical giant's global manufacturing, research and sales operations have still not be full restored since the June attacks.
Wannacry Inspires Worm-like Module in Trickbot
The malware is being primarily distributed via email spam in the form of spoofed invoices from an international financial services com, says Flashpoint.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Using Threat Data to Improve Your Cyber Defense

    Attend this webinar to learn how you can determine which threats pose the greatest danger to your enterprise, and how to analyze threat data and use it to help improve your organization's cyber defense.

  • The Real Impact of a Data Security Breach

    In this webcast, experts discuss the real losses associated with a breach, both in the data center and in the business and how an effective data breach response program can help mitigate the damage.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.