Follow Dark Reading:
 December 10, 2016
LATEST SECURITY NEWS & COMMENTARY
Obama Orders Inquiry Into Cyberattacks On Democratic Party Websites
President wants U.S. intelligence to provide report before he leaves office Jan. 20.
Russian Authorities Make Arrests In Wake Of Central Bank Cyberattack
Arrests in the $19-million theft were made in a joint operation by FSB and Interior Ministry, says central bank official.
Why Video Game Publishers Must Adopt Enforceable Security Standards
Video games have been under attack at an unprecedented rate since 2012, with cyber criminals playing an increasingly significant role.
Bangladesh Cybertheft Probe: 5 Bank Officials 'Indirect Accomplices'
Investigation panel alleges hackers may have exploited inadvertent loopholes left by technicians.
Only 25% Companies Equipped To Handle Data Breaches
Research by Tripwire on cybersecurity challenges reveals only 3% organizations outsource security issues to experts.
MORE NEWS & COMMENTARY
HOT TOPICS
Where Cybercriminals Go To Buy Your Stolen Data
What malicious sites provide both free and paid access to stolen credit cards, company databases, malware and more?

From Carna To Mirai: Recovering From A Lost Opportunity
We had four years to prepare for recent DDoS attacks and failed. How can we learn from our mistakes?

Cartoon Content: Naughty Or Nice

Enter a caption and win an Amazon gift card!

MORE
EDITORS' CHOICE

How Retailers Can Fight Holiday Season Hackers
Experts offer tips for locking down retailers' point-of-sale systems for the busy holiday shopping season.
Tech Resources
ACCESS TECH LIBRARY NOW

  • 4 Keys to Improving Security Threat Detection

    In this webinar, Ixia will show how to combine the four keys to improving security threat detection into a Security Fabric to deliver greater context and intelligent distribution to monitored traffic. You will learn how to create actionable threat intelligence ...

  • 7 Key Cloud Security Trends Shaping 2017 & Beyond

    Cloud computing is enabling business transformation as organizations accelerate time to market and business agility. Evolving cloud technologies and approaches, however, can create security gaps and human errors. Data protection rests with you and your organization and not the cloud ...

MORE WEBINARS

Partner Perspectives

Survey Stresses Importance Of Securing The Internet of Things
If organizations monitor and deploy IoT devices with caution, they can stay ahead of the curve and continue to keep all of their endpoints protected.

PoisonTap USB Device Can Hack A Locked PC In A Minute
This is just one example of an emerging technology that enables anyone with physical access to a computer's USB port to potentially harvest data and gain access by spoofing an Internet ecosystem.

Protect Your Company From Hackable Holiday Gifts
This holiday season promises to be full of devices, apps, and connectivity. Planning and executing appropriate security precautions now will save your business from a serious breach later.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.