Follow Dark Reading:
 July 13, 2016
LATEST SECURITY NEWS & COMMENTARY
Profiles Of The Top 7 Bug Hunters From Around the Globe
'Super hunters' share a common goal: to find the most high impact valid bugs before a bad guy does.
ICS Mess: US Industrial Systems The Most Exposed
New data shows vulnerable ICS equipment even as vendors are improving security.
EU's General Data Protection Regulation Is Law: Now What?
Organizations have two years to prepare to act as borrowers, not owners, of customer data. Here are seven provisions of the new GPDR you ignore at your peril.
Healthcare Hacks Face Critical Condition
It's not just SSNs and credit cards -- detailed patient records and full EHR databases are targeted by cybercriminals today.
Covert Voice Commands Can Hack A Smartphone
Researchers from Georgetown University and the University of California, Berkeley say cybercriminals could use hidden voice commands via popular YouTube videos to infect Androids and iPhones with malware.
Omni Hotels Discloses Payment Card Breach
Certain properties infected by point-of-sale malware that stole guests' card details.
SWIFT Boosts Defense Against Cyberattacks
Cyber security firms hired, intelligence team set up to ward off future attacks on banks through SWIFT.
MORE NEWS & COMMENTARY
HOT TOPICS
New 'Ranscam' Ransomware Lowers The Bar But Raises The Stakes
Cisco Talos researchers discover new variant that doesn't decrypt your files after you pay up--it has already deleted them.

Does Defense In Depth Still Work Against Today's Cyber Threats?
Yes. But not for much longer unless the industry shifts to an automated security and zero trust model.

Cybercrime Now Surpasses Traditional Crime In UK
The US could be on an even worse trajectory, according to one security expert.

MORE
EDITORS' PICK

Dark Reading Launches Best Of Black Hat Awards Program; Finalists Selected
New awards recognize innovation on Black Hat exhibit floor, including startups, emerging companies, and industry thinkers
Tech Resources

Partner Perspectives

Saving The Security Operations Center With Endpoint Detection And Response
EDR is the beginning of our return to control in the fight against cybercrime.

Shifting The Economic Balance Of Cyberattacks
Our goal should be to simply make the cost of conducting a cyberattack so expensive that cybercriminals view attacking our organization as a bad return on investment.

Adaptive Security Demands A Shift In Mindset: Part 2 In A Series
By adopting new ways of thinking about security, improving the capabilities of existing systems, and integrating key innovations, enterprises will be well on their way to better security.

FEATURED REPORTS
  • Forrester Report: Cloud Powers The New Connected Economy

    This May 2016 Forrester report explores a landscape in which organizations in every industry are moving forward from cloud adoption to cloud creation and participation. Learn how you are a member of this networked economy & how the steps you take may ...

  • Gartner Predictions for 2016: Mobile and Wireless

    In this new phase of mobility, wireless and mobile technologies expand our real world beyond simple smart devices, creating new digital worlds. IT leaders and vendors are challenged by new privacy and security threats from new technology sources.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.