Follow Dark Reading:
 November 17, 2016
LATEST SECURITY NEWS & COMMENTARY
How To 'PoisonTap' A Locked Computer Using A $5 Raspberry Pi
White hat hacker Samy Kamkar has come up with a way of to hijack Internet traffics from a password-protected computer.
Security Experts Call For Regulation On IoT Cybersecurity
During a House Committee hearing today, Bruce Schneier also asks for the establishment of a new government agency devoted to cybersecurity.
Thank Ransomware For Next-Gen Endpoint Security Momentum
More organizations are getting serious about making the move to newer endpoint security technologies that go beyond signature-based detection.
Windows 10 Updates Target Ransomware Threats
Microsoft strengthens Windows 10 security with measures to prevent, detect, and respond to ransomware attacks. But they are only useful for businesses using all the right tools.
Sharing Threat Intel: Easier Said Than Done
For cyber intelligence sharing to work, organizations need two things: to trust each other and better processes to collect, exchange and act on information quickly.
MORE NEWS & COMMENTARY
HOT TOPICS
Russian Hackers Behind DNC Breach Wage Post-US Election Attacks
Less than six hours after Donald Trump was named President-Elect of the US, Cozy Bear/APT29/CozyDuke nation-state hackers kicked off waves of spearphishing attacks.

Microsoft Abusing Market Dominance In AV Space, Kaspersky Lab Says
Redmond is unfairly shutting out rivals and uninstalling third-party tools without user permission, Kaspersky says.

Security Metrics Checklist
Which metrics are the best indicators of a strong cybersecurity team? Experts say security pros should be recording and reporting these data points to demonstrate their success.

MORE
EDITORS' CHOICE

The 7 Most Significant Government Data Breaches
Mega compromises at federal and state agencies over the past three years has compromised everything from personal data on millions to national security secrets.
IN CASE YOU MISSED IT

Re-Thinking Your Enterprise Security Strategy

The archives of all the virtual event keynotes and panels from Tuesday are now available for on-demand viewing.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Containerized Apps - Changing Security

    With continuous deployment of micro-services and Docker containers becoming mainstream, it's imperative that security initiatives include security scanning and monitoring. Increasingly, known open source vulnerabilities have been the "way in" for attackers. This is a major concern for organizations worldwide ...

  • Spearphishing & Targeted Social Engineering Attacks On Your Users

    In this eye-opening webinar, top experts on phishing and social engineering will discuss the motives and methods that attackers use to execute these targeted "spearphishing" attacks. You'll get insight on how the attackers choose their social engineering targets, the methods ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.