Follow Dark Reading:
 October 26, 2016
LATEST SECURITY NEWS & COMMENTARY
NHTSA Issues Cybersecurity Best Practices For Automakers
Focus is on limiting access to electronic components and what someone can do with that access.
Growing Fear Of IP Theft Hits Power, Auto, Industrial Sectors Hardest
Survey finds 58% of respondents predict a rise in IP cyber theft and most feel inside employees are the greatest risk.
Blockchain & The Battle To Secure Digital Identities
This emerging technology is a promising way to verify transactions without compromising your digital identity.
CloudFanta Malware Targets Victims Via Cloud Storage App
The malware campaign uses the Sugarsync cloud storage app to distribute malware that steals user credentials and monitors online banking activity.
US Officials: Russian Hackers Could Spread Online Rumors Of Voter Fraud
US authorities ask election officials to be alert to false documents posted online to influence public perception.
St. Jude Implant Case: Expert Validates Muddy Waters Claim
Cybersecurity firm Bishop Fox says tests have confirmed that cardiac devices made by St. Jude are susceptible to hacking.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Imminent IoT Threats
Attacks against smart home products, medical devices, SCADA systems, and other newly network-enabled systems signal the beginning of a new wave of attacks against the IoT.

Microsoft's New Patch Tuesday Model Comes With Benefits And Risks
Microsoft has transitioned its Patch Tuesday update process to a cumulative rollup model. What businesses need to know about the new patching regimen.

9 Sources For Tracking New Vulnerabilities
Keeping up with the latest vulnerabilities -- especially in the context of the latest threats -- can be a real challenge.

MORE
EDITORS' CHOICE

7 Scary Ransomware Families
Here are seven ransomware variants that can creep up on you.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Warning: Healthcare Data Under Attack
We as an industry must demand greater protection of our medical data.

Vendor Security Alliance To Improve Cybersecurity Of Third-Party Providers
Member companies can use their VSA rating when offering their services, effectively skipping the process of verification done by prospective businesses.

Why Aren't We Talking More Proactively About Securing Smart Infrastructure?
Let's not perpetuate the vicious cycle of security complexity and failure by trying to bolt on security after the fact.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.