Follow Dark Reading:
 April 30, 2018
LATEST SECURITY NEWS & COMMENTARY
More Than 1M Children Victims of Identity Fraud in 2017
Total fraud against kids amounted to $2.6 billion and more than $540 million in out-of-pocket costs to families, a new report finds.
'Zero Login:' The Rise of Invisible Identity
Will new authentication technologies that recognize users on the basis of their behaviors finally mean the death of the despised password?
'Don't Extort Us': Uber Clarifies its Bug Bounty Policy
Updated parameters should help avoid future extortion incidents.
Reno Man Created 8,000 Fake Online Accounts via Stolen Identities
Kenneth Gilbert Gibson pleaded guilty to creating more than 8,000 fraudulent online accounts to launch a $3.5M fraud operation.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Ways Hackers Monetize Stolen Data
Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.

Threat Actors Turn to Blockchain Infrastructure to Host & Hide Malicious Activity
.bit domains are increasingly being used to hide payloads, stolen data, and command and control servers, FireEye says.

It's Time to Take GitHub Threats Seriously
There's a good chance your company has projects on the source code management system, but the casual way many developers use GitHub creates security issues.

MORE
EDITORS' CHOICE

12 Trends Shaping Identity Management
As IAM companies try to stretch 'identity context' into all points of the cybersecurity market, identity is becoming 'its own solar system.'

Name That Toon: Threat Landscape

We provide the cartoon. You provide the caption. Enter to win a $25 Amazon Gift Card.


Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Europe and Asia Take on More DDoS Attacks
While North American targets have historically been on the receiving end of the majority of DDoS attacks since their inception, that trend changed in 2017.

Cloud Misconceptions Are Pervasive Across Enterprises
Shadow IT is rampant at many organizations that rely upon cloud-delivered tools and services to enable remote work, according to a new study. Here's what security teams need to do about it.

IDS & IPS: Two Essential Security Measures
To protect business networks, one line of security isn't enough.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.