Follow Dark Reading:
 March 02, 2017
LATEST SECURITY NEWS & COMMENTARY
New Version Of Dridex Banking Trojan Uses 'AtomBombing' To Infect Systems
It's the first malware to use a newly disclosed code-injection method to break into to Windows systems
Hacked Robots Present a New Insider Threat
Robots and their control software are rife with critical and painfully obvious security flaws that make them easily hackable, new research shows.
New Cybersecurity Regulations Begin Today For NY Banks
New York's new security regulations for financial industry viewed as potential model for other states.
Malware Kits, Advertising Trojans Drive Mobile Risk
Kaspersky Lab research and INTERPOL analysis highlight growth in advertising Trojans and mobile malware kit sales on the Dark Web.
Trump Names New Head of Economic Council for Cybersecurity, Technology
Grace Koh will be special assistant to the President for technology, telecom, and cybersecurity.
Palo Alto Networks Acquires LightCyber
Company will integrate LightCyber technology into its Next-Generation Security Platform.
MORE NEWS & COMMENTARY
HOT TOPICS
20 Cybersecurity Startups To Watch In 2017
VC money flowed plentifully into the security market last year, fueling a new crop of innovative companies.

Russia Top Source Of Nefarious Internet Traffic
Honeypot research from F-Secure shows majority of illicit online activity coming from IP addresses in Russia - also where ransomware is a hot commodity.

Road Map To A $200,000 Cybersecurity Job
Looking to get ahead in cybersecurity? Here are four areas to keep in mind as you make a five-year career plan.

MORE
EDITORS' CHOICE

Best Practices for Lowering Ransomware Risk
The first step is to avoid falling prey in the first place. That means teaching your entire organization - from IT staff to executive management - how not to be a victim.
Tech Resources
ACCESS TECH LIBRARY NOW

  • 5 Most Effective Breach Methods - A Virtual Hacker Perspective

    The SafeBreach platform continuously simulates hacker behavior, allowing organizations to see the impact from a breach - before it occurs. Which were the most effective techniques we used? How do they work? Which security controls were effective against these methods? ...

  • Your Private Medical Records Are for Sale. Should you care?

    Author Adam Tanner joins All Analytics radio to talk about the process and issues around private medical records and how they are now being re-identified and used for commercial purposes. Join us for a don't miss discussion!

MORE WEBINARS

Partner Perspectives

DNSSEC: Why Do We Need It?
The number of signed domain names has grown considerably over the past two and a half years but some sectors are heavily lagging behind.

'Insider Sabotage' among Top 3 Threats CISOs Can't yet Handle
These five steps can help your organizations limit the risks from disgruntled employees and user errors.

Report: Only 2 in 3 Cyber Attacks Can Be Stopped with Current Defenses
A recent Bitdefender survey of 250 US IT execs in companies with 1000 or more PCs paints a disturbing picture of cybersecurity preparedness in the enterprise.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.