Follow Dark Reading:
 June 13, 2017
LATEST SECURITY NEWS & COMMENTARY
New Malware-as-a-Service Offerings Target Mac OS X
MacSpy and MacRansom are two early variants of malware-as-a-service portals targeting the broader population of Mac users.
First Malware Designed Solely for Electric Grids Caused 2016 Ukraine Outage
Attackers used CrashOverride/Industroyer to cause a partial power outage in Kiev, Ukraine, but it can be used anywhere, say researchers at Dragos and ESET.
The Detection Trap: Improving Cybersecurity by Learning from the Secret Service
Intruders often understand the networks they target better than their defenders do.
FTC Issues Advice on Mobile Phone Data Security, Identity Theft
The Federal Trade Commission offers hindsight and foresight on ways to reduce identity theft should your mobile device get stolen.
MORE NEWS & COMMENTARY
HOT TOPICS
Cybersecurity Faces 1.8 Million Worker Shortfall By 2022
(ISC)2 report shows the skills shortage is getting worse.

New Attack Method Delivers Malware Via Mouse Hover
'Mouseover' technique relies on users hovering over hyperlinked text and images in Microsoft PowerPoint files to drop Trojan.

WannaCry Exploit Could Infect Windows 10
The EternalBlue remote kernel exploit used in WannaCry could be used to infect unpatched Windows 10 machines with malware, researchers find.

MORE
EDITORS' CHOICE

How End-User Devices Get Hacked: 8 Easy Ways
Security experts share the simplest and most effective methods bad guys employ to break into end-user devices.
Tech Resources
ACCESS TECH LIBRARY NOW

  • AI & Machine Learning: Real World Use Cases

    At this event you will get real-world use cases for machine learning in business and industry, designed to spark your thinking as you examine your first, or second, or 27th, implementation of this advanced technology in your organization. Find out ...

  • Data: To Trust or to Not Trust the Data, That is The Question!

    Join us as the author of the book "Everydata: The Misinformation Hidden in the Little Data You Consume Every Day" examines common ways data is misrepresented or misinterpreted, the limitations of forecasts and predictions, and how to recognize "Tells" in ...

MORE WEBINARS

Partner Perspectives

Hide & Seek: Security Teams Lack Visibility in the Cloud
IT leaders remain on the hot seat when it comes to their ability to continuously monitor the state of their data and operations. How hot is your seat?

Will Deception as a Defense Become Mainstream?
If your organization has the right resources, deception strategies offer a powerful way to slow down and entrap potential intruders.

DevOps & SecOps: The Perks of Collaboration
Organizations can't bypass security in favor of speed, making SecOps a perfect complement to DevOps.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.