Follow Dark Reading:
 May 04, 2017
LATEST SECURITY NEWS & COMMENTARY
Netflix Incident A Sign Of Increase In Cyber Extortion Campaigns
Attackers using threats of data exposure and DDoS disruptions to try and extort ransoms from organizations
Healthcare Breaches Hit All-Time High in 2016
More than 300 healthcare businesses reported data breaches in 2016, but a drop in leaked records put fewer Americans at risk.
Google Docs Phishing Attack Abuses Legitimate Third-Party Sharing
Phishing messages appear nearly identical to legitimate requests to share Google documents, because in many ways, they are.
Seeing Security from the Other Side of the Window
From the vantage of our business colleagues, security professionals are a cranky bunch who always need more money, but can't explain why.
7 Steps to Fight Ransomware
Perpetrators are shifting to more specific targets. This means companies must strengthen their defenses, and these strategies can help.
Sabre Breach May Put Traveler Data at Risk
Travel giant Sabre investigates a potentially significant data breach of a reservations system used by more than 32,000 properties.
Small Budgets Cripple Cybersecurity Efforts of Local Governments
A survey of local government chief information officers finds that insufficient funding for cybersecurity is the biggest obstacle in achieving high levels of cyber safety.
MORE NEWS & COMMENTARY
HOT TOPICS
10 Cybercrime Myths that Could Cost You Millions
Don't let a cybersecurity fantasy stop you from building the effective countermeasures you need to protect your organization from attack.

Fileless Malware Attacks Continue to Gain Steam
Endpoint woes grow as fileless attacks grow in prevalence and file-based attacks remain largely undetected by AV engines.

New OWASP Top 10 Reveals Critical Weakness in Application Defenses
It's time to move from a dependence on the flawed process of vulnerability identification and remediation to a two-pronged approach that also protects organizations from attacks.

MORE
EDITORS' CHOICE

Researchers Hack Industrial Robot
New research finds more than 80,000 industrial routers exposed on the public Internet.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Data Tells: Dissecting Every Day Data

    Join us as the author of the book "Everydata: The Misinformation Hidden in the Little Data You Consume Every Day" examines common ways data is misrepresented or misinterpreted, the limitations of forecasts and predictions, and how to recognize "Tells" in ...

  • Get Control Over Your Data Quality/Data Governance

    AllAnalytics' year-end online poll asking about 2017 goals revealed that your top priority this year is around data quality and data trust. How is your data quality program measuring up so far this year? Attend this radio show and find out!

MORE WEBINARS

Partner Perspectives

OSX.Bella: Mac Malware Strikes Again
This variant of the OSX.Dok dropper behaves altogether differently, and installs a completely different payload.

OSX.Dok: New & Sophisticated Mac Malware Strikes
Phishing-deployed malware can capture account credentials for any website users log into.

Locky Returns with a New (Borrowed) Distribution Method
A layered defense is a strong security posture for dealing with a threat like Locky, that can come in different disguises.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.