Follow Dark Reading:
 June 25, 2016
LATEST SECURITY NEWS & COMMENTARY
NASCAR Race Team Learns Ransomware Lesson The Hard Way
Pays ransom to save $2 million worth of information, warns others of the dangers.
Security Lessons from My Financial Planner
Security investments can be viewed as a portfolio. If we think in portfolio terms, we realize that ROI is a backwards-looking measure. What else can we learn from financial planners?
'PunkyPOS' Malware Dissected
PunkeyPOS copies card data and bank magnetic stripes and has breached around 200 POS terminals in the US, says report.
SEC Sues UK Man For Hacking US Investors' Accounts
SEC files case in US court, alleges offender cost victims $289,000 through illegal trades.
MORE NEWS & COMMENTARY
HOT TOPICS
Internet Of Things & The Platform Of Parenthood
A new father's musings on the problems with securing embedded systems, and why there are so few incentives for architecting trustworthy IoT technology from the ground up.

How To Lock Down So Ransomware Doesn't Lock You Out
Ransomware has mutated into many different forms - and it's not always easy to catch them all, but here are some things you can do.

Phishing, Whaling & The Surprising Importance Of Privileged Users
By bagging a privileged user early on, attackers can move from entry point to mission accomplished in no time at all.

MORE
EDITORS' CHOICE

5 Ways To Think Like A Hacker
Security expert says CISOs need to use simulations more effectively so they can understand how hackers work and beat them at their own game.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Adaptive Security Demands A Shift In Mindset: Part 2 In A Series
By adopting new ways of thinking about security, improving the capabilities of existing systems, and integrating key innovations, enterprises will be well on their way to better security.

The Importance Of Taking A More Active Role To Protect Our Data
Big data has lots of potential to make our decisions more efficient and effective. But like any powerful substance, too much in the wrong hands can have disastrous consequences.

A Real World Analogy For Patterns of Attack
Patterns reveal exponentially more relevant information about attempted malfeasance than singular indicators of an attack ever could.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.