Follow Dark Reading:
 February 09, 2017
LATEST SECURITY NEWS & COMMENTARY
Organizations In 40 Countries Under 'Invisible' Cyberattacks
Unknown threat actors are stealing sensitive financial data using memory resident malware crafted from legitimate tools, Kaspersky Lab warns.
Facebook Aims To Shape Stronger Security Practices
Facebook is among social platforms focusing on security as social media poses a growing risk to individuals and businesses.
What to Watch (& Avoid) At RSAC
A renowned security veteran shares his RSA dance card, offering views on technologies destined for the dustbin of history and those that will move the industry forward.
Sophos Acquisition Targets Next-Gen Endpoint Security
Sophos buys Invincea to bring next-gen malware protection and machine learning into its product portfolio.
David Beckham Hires Cybersecurity Expert To Probe Email Leak
18.6 million emails were stolen and leaked from PR firm, including allegedly doctored messages made to damage Beckham's reputation.
Dutch Voter Guide Website Leak Highlights Privacy Concerns
StemWijzer fixes vulnerabilities after researcher discovers website is secretly maintaining voter-preference record.
MORE NEWS & COMMENTARY
HOT TOPICS
Enterprise Android Vs iOS: Which is More Secure?
The answer is not as simple as you think. A mobile security expert parses the pros and cons.

Talking Cybersecurity From A Risk Management Point of View
CenturyLink CSO David Mahon reflects on the evolution of the chief information security officer and why today's CISOs are increasingly adopting a risk-based approach to security.

Windows SMB Zero-Day Exploit On The Loose
Vulnerability allows remote attackers to trigger denial-of-service conditions on several Windows client versions.

MORE
EDITORS' CHOICE

10 Essential Elements For Your Incident-Response Plan
The middle of a DDoS attack or ransomware infection is hardly the time to start talking about divisions of labor, or who should do what when.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Three main threats companies aren't prepared to handle include outside attacks, data vulnerability and insider sabotage.

Meet 'Fruitfly:' Mac Malware Targeting Biomedical Research Centers
This newly discovered code contains indications that it has been circulating undetected for at least a couple years.

Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
When protecting physical or virtual endpoints, it's vital to have more than one layer of defense against malware.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.