Follow Dark Reading:
 April 01, 2016
LATEST SECURITY NEWS & COMMENTARY
New Portal Launched For ICS/SCADA Threat Intelligence-Sharing Among Nations
The East-West Institute teamed up with the US ICS-ISAC to create a platform for critical infrastructure operators worldwide to share threat data.
Apple's Workflow For Enterprise iOS App Distribution Vulnerable To Attack
Millions of iPhones and iPads running iOS 9 can be exploited if enrolled in mobile device management, Check Point Software says.
Symantec: Financial Trojans Declined By 73% In 2015
Symantec detected far fewer financial Trojans in 2015 and saw cybercriminals focus more of their efforts directly on financial institutions.
Machine Learning In Security: Seeing the Nth Dimension in Signatures
How adding "supervised" machine learning to the development of n-dimensional signature engines is moving the detection odds back to the defender.
QUICK HITS

Hackers Attack Major US Law Firms
Hackers broke into computer networks of prominent law firms, and the FBI is investigating whether the stolen data was used for illegal trading purposes, the WSJ reports.
NIST Publishes New Security Standard For Encrypting Credit Card, Medical Info
NIST published a new cybersecurity standard that specifies 'format- preserving encryption' techniques to secure credit card number and sensitive medical information.
MORE NEWS & COMMENTARY
HOT TOPICS
'FBiOS' Case Heading For A New Firestorm
The surprise developments in the FBI v Apple case offer little reason to celebrate for encryption and privacy advocates.

Dangerous New USB Trojan Discovered
'USB Thief' could be used for targeted purposes, researchers at ESET say.

MORE
EDITORS' CHOICE

Cybercrime: A Black Market Price List From The Dark Web
What does it cost for malware, stolen identities and other tools of the cybercriminal trade? Probably less than you think.
6 Hot Cybersecurity Startups: MACH37's Spring Class Of 2016
Intense 90-day program mentors budding entrepreneurs in the finer points of developing a viable technology business for the real world of information security.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

When It Comes To Cyberthreat Intelligence, Sharing Is Caring
Shared cyberthreat intelligence will soon be a critical component of security operations, enabling organizations to better protect their digital assets and respond more quickly to emerging threats.

Iranian Hacker Indictment Reminds Us That Risks To Critical Infrastructure Are Real
Defending against the combination of human and technical exploits requires the collaboration of human and technical security defenses.

Who Took The Cookies From The Cookie Jar?
The indictment of five Iranian hackers three years after the fact raises the question: Is naming them a worthwhile part of the threat defense lifecycle, or is it a meaningless distraction?

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.