Follow Dark Reading:
 June 10, 2017
LATEST SECURITY NEWS & COMMENTARY
New Attack Method Delivers Malware Via Mouse Hover
'Mouseover' technique relies on users hovering over hyperlinked text and images in Microsoft PowerPoint files to drop Trojan.
Your Information Isn't Being Hacked, It's Being Neglected
To stop customer information from being compromised, we must shore up the most vulnerable parts first, the day-to-day IT operations work that builds, configures, and changes systems.
Security Orchestration Fine-Tunes the Incident Response Process
Emerging orchestration technology can cut labor-intensive tasks for security analysts.
From Reporter to Private Investigator to Security Engineer
How I fell in love with coding and traded in a camera-rigged Prius for a MacBook and a GitHub account.
MORE NEWS & COMMENTARY
HOT TOPICS
WannaCry Exploit Could Infect Windows 10
The EternalBlue remote kernel exploit used in WannaCry could be used to infect unpatched Windows 10 machines with malware, researchers find.

Cybersecurity Faces 1.8 Million Worker Shortfall By 2022
(ISC)2 report shows the skills shortage is getting worse.

Slack, Telegram, Other Chat Apps Being Used as Malware Control Channels
Cybercriminal are abusing third-party chat apps as command-and-control infrastructures to spread their malware.

MORE
EDITORS' CHOICE

The Economics of Software Security: What Car Makers Can Teach Enterprises
Embedding security controls early in the application development process will go a long way towards driving down the total cost of software ownership.
Tech Resources
ACCESS TECH LIBRARY NOW

  • AI & Machine Learning: Real World Use Cases

    AT this event you will get real-world use cases for machine learning in business and industry, designed to spark your thinking as you examine your first, or second, or 27th, implementation of this advanced technology in your organization. Find out ...

  • Psycho-demographic Profiles: Fact, fiction and the future

    Join us as we welcome Michal Kosinski, a psychologist, data scientist, and expert in psycho-demographic profiles to A2 radio. For the uninitiated, these profiles are what Donald Trump, Barak Obama, and Hillary Clinton's presidential campaign organizations all leveraged in their ...

MORE WEBINARS

Partner Perspectives

Hide & Seek: Security Teams Lack Visibility in the Cloud
IT leaders remain on the hot seat when it comes to their ability to continuously monitor the state of their data and operations. How hot is your seat?

Will Deception as a Defense Become Mainstream?
If your organization has the right resources, deception strategies offer a powerful way to slow down and entrap potential intruders.

DevOps & SecOps: The Perks of Collaboration
Organizations can't bypass security in favor of speed, making SecOps a perfect complement to DevOps.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.