Follow Dark Reading:
 April 11, 2017
LATEST SECURITY NEWS & COMMENTARY
One of World's Most Wanted and Prolific Alleged Spammers Arrested
Suspected mastermind behind massive Kelihos botnet Petyr Levashov nabbed in botnet takedown operation.
CIA-Linked Hacking Tools Tied to Longhorn Cyber Espionage Group
Symantec matches tools exposed in Vault 7 documents leak reportedly from the CIA with those used by cyber espionage group that has been targeting governments and private businesses.
Extradition Hearing Expected Soon for Alleged LinkedIn, DropBox Hacker
Yevgeniy Nikulin is wanted in the US for breaches involving LinkedIn Corp, Dropbox, and Formspring.
GameStop Probes Hack of Customer Payment Data
Customers visiting the video gaming website may have had financial data stolen between Sept. 2016 and Feb. 2017.
How to Crack Cybersecurity's Glass Ceiling
Sage career advice to young women from the female CTO of a security startup: Get a pair of earplugs, and put them in when you hear words like 'can't' or 'don't.'
MORE NEWS & COMMENTARY
HOT TOPICS
7 Ways Hackers Target Your Employees
One employee under reconnaissance by cyberattackers can put your whole business at risk. Where are they being targeted, and what should they know?

Commodity Ransomware Is Here
When deploying ransomware is as easy as ordering a pizza, the best defense is through better threat intelligence sharing.

Cybercriminals Seized Control of Brazilian Bank for 5 Hours
Sophisticated heist compromised major bank's entire DNS infrastructure.

MORE
SECURITY LIVE AT INTEROP ITX

Hear ADP CSO Roland Cloutier speak about Managing Risks to Reap Rewards: How to Use Security as a Growth Advantage during Interop ITX, May 15-19, at the MGM Grand in Las Vegas.


More from Roland Cloutier on Dark Reading

Setting Up Security as a Business: 3 Best Practices for Security Execs
Security leaders need to show they provide more than stop-the-bad guys services. Here's how.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Don't be Duped: Hadoop Roll-out can be Pain Free & Easy

    Get ahead of the curve in harnessing the power of data analytics. Don't hinder your organizations competitive edge due to Hadoop hurdles, jump over them!

  • Threat Intelligence: Fight Threats, Not Logs

    How to operationalize threat intelligence for protection & prevention More is not always better. When it comes to data and threat intelligence, better prevention is offered via the right approach. Don't waste your resources by drowning them in a sea of ...

MORE WEBINARS

Partner Perspectives

Top 5 Dumbest Cyber Threats That Still Pay Off
Some hackers are fairly predictable in their successful use of really dumb attacks.

Exploit Kits: Winter 2017 Review
We take another look at the current EK scene by going over RIG, Sundown, Neutrino and Magnitude.

Malware Explained: Packer, Crypter & Protector
These three techniques can protect malware from analysis. Here's how they work.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.