Follow Dark Reading:
 November 13, 2017
LATEST SECURITY NEWS & COMMENTARY
New Locky Ransomware Takes Another Turn
A newly discovered strain of Locky ransomware has been discovered masquerading as legitimate Microsoft Word documents.
Customers Punish Breached Companies
Equifax's 25% reduction in share value and other industry-wide stats show that consumers aren't so apathetic about cybersecurity after all.
Why Common Sense Is Not so Common in Security: 20 Answers
Or, questions vendors need to ask themselves before they write a single word of marketing material.
Google Updates Chrome to Prevent Unwanted Content, Redirects
Changes to Google Chrome aim to prevent users from being redirected to unexpected websites and unwanted content.
MORE NEWS & COMMENTARY
HOT TOPICS
How I Infiltrated a Fortune 500 Company with Social Engineering
Getting into the company proved surprisingly easy during a contest. Find out how to make your company better prepared for real-world attacks.

Burnout, Culture Drive Security Talent Out the Door
Security's efforts to bridge the talent gap mean little when workers don't want to stay in the industry.

'Eavesdropper' Exposes Millions of Mobile Conversations
App developers fail to remove their hardcoded credentials, affecting hundreds of millions of data records.

MORE
EDITORS' CHOICE

6 Steps for Sharing Threat Intelligence
Industry experts offer specific reasons to share threat information, why it's important - and how to get started.
Inhospitable: Hospitality & Dining's Worst Breaches in 2017
Hotels and restaurants are in the criminal crosshairs this year.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cloud Security: Don't Go Blind While Playing in the Cloud

    Attend this webinar to understand the security transformation from an on-prem fortress mentality to federated cloud services functioning outside your traditional zone of control.

  • Ransomware: Trends, Use Cases & Protection

    Ransomware is one of the favorite flavors of malware and is particularly vicious and showing no signs of slowing down. Join this webinar as Senior Security Researcher Kyle Wilhoit helps us to understand ransomware trends, ransomware use cases, the financial ...

MORE WEBINARS

Partner Perspectives

'Goldilocks' Legislation Aims to Clean up IoT Security
The proposed Internet of Things Cybersecurity Improvement Act of 2017 is not too hard, not too soft, and might be just right.

5 Reasons CISOs Should Keep an Open Mind about Cryptocurrency
With untold new markets for Bitcoin and other 'alt-coins,' it's going to be an exciting future -- and security leaders need to get ready for it.

5 Reasons Why the CISO is a Cryptocurrency Skeptic
If you think all you need is technology to defend against bad guys, you shouldn't be a CISO. But technology is all cryptocurrency is, starting with Bitcoin.

FEATURED REPORTS
  • The State of Ransomware

    Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find ...

  • Surviving the IT Security Skills Shortage

    Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.