Follow Dark Reading:
 July 08, 2017
LATEST SECURITY NEWS & COMMENTARY
NotPetya: How to Prep and Respond if You're Hit
Security pros share practices to prepare and handle advanced malware attacks like NotPetya.
IoT Physical Attack Exploit to be Revealed at Black Hat
Security researcher Billy Rios plans to demonstrate how an exploit can cause an IoT device to launch a physical attack against a human.
The SOC Is Dead...Long Live the SOC
The traditional security operations center can't deal with present reality. We must rethink the concept in a way that prepares for the future.
Telecom Hacker Sentenced for Laundering Millions
Pakistani man sentenced to prison for hacking into PBX systems and generating millions of dollars via bogus premium phone calls and laundering the money.
IRS to Launch Educational Phishing Series
The Internal Revenue Service is preparing to launch an educational series on phishing attacks and related warning signs.
MORE NEWS & COMMENTARY
HOT TOPICS
CopyCat Malware Infects 14 Million Android Devices
A new malware strain is discovered with a novel approach to infecting Android handheld devices with adware.

9 Ways to Protect Your Cloud Environment from Ransomware
The same technology driving faster collaboration and data transfer also enables cybercriminals to quickly spread ransomware.

MORE
EDITORS' CHOICE

Hacking the State of the ISIS Cyber Caliphate
Researchers say Islamic State's United Cyber Caliphate remains in its infancy when it comes to cyberattack expertise.
Black Hat Survey: Security Pros Expect Major Breaches in Next Two Years
Significant compromises are not just feared, but expected, Black Hat attendees say
Tech Resources
ACCESS TECH LIBRARY NOW

  • AI, Machine Learning & The Future of News

    More organizations today are looking to integrate artificial intelligence and machine learning into their operational processes, and news and financial data firm Bloomberg is no exception. A2 Radio welcomes Bloomberg's CTO and Head of Data Science Gideon Mann to the ...

  • New Security Technologies: Advice & Best Practices on Selecting The Right One

    Given today's threat landscape, combined with so many security options available today, it can be daunting when selecting new or alternative technologies to protect your business. Your security team has unique challenges; therefore, you should be asking your next security ...

MORE WEBINARS

Partner Perspectives

Security Experts & Hackers: We're Not So Different
Using the similarities among hackers and security programmers can be an advantage.

Doxing, DoS & Defacement: Today's Mainstream Hacktivism Tools
Anyone can get angry at you and become a hacktivist. Here's how to protect your organization from these increasingly common cyber attacks.

Compliance in the Cloud Needs To Be Continuous & Automated
Complex IT environments require timely visibility into risk and compliance.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.