Follow Dark Reading:
 April 04, 2016
LATEST SECURITY NEWS & COMMENTARY
Ransomware Authors Break New Ground With Petya
Instead of encrypting files on disk, Petya goes for the jugular by encrypting the entire disk instead, says F-Secure.
Avoiding Legal Landmines in Data Breach Response
Building a legally defensible cybersecurity program means seeking out guidance from legal advisors before a serious incident forces you together.
DoD Picks HackerOne To Run Its Historic Bug Bounty Pilot
HackerOne will run US federal government's first-ever bug bounty pilot 'Hack The Pentagon.'
'FBiOS' Case Heading For A New Firestorm
The surprise developments in the FBI v Apple case offer little reason to celebrate for encryption and privacy advocates.
Apple's Workflow For Enterprise iOS App Distribution Vulnerable To Attack
Millions of iPhones and iPads running iOS 9 can be exploited if enrolled in mobile device management, Check Point Software says.
MORE NEWS & COMMENTARY
HOT TOPICS
Cybercrime: A Black Market Price List From The Dark Web
What does it cost for malware, stolen identities and other tools of the cybercriminal trade? Probably less than you think.

FBI Cracks Terrorist's iPhone -- Sans Apple
Now there's a new hole in the iPhone 5c, so what happens next?

NIST Cybersecurity Framework Adoption Hampered By Costs, Survey Finds
Security pros consider the NIST framework an industry best practice, yet half of its adopters say its complete implementation involves a high level of investment.

MORE
EDITORS' CHOICE

Name That Toon: It's A Dog's Life

We provide the cartoon. You write the caption. Win an Amazon gift card.


Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

When It Comes To Cyberthreat Intelligence, Sharing Is Caring
Shared cyberthreat intelligence will soon be a critical component of security operations, enabling organizations to better protect their digital assets and respond more quickly to emerging threats.

Iranian Hacker Indictment Reminds Us That Risks To Critical Infrastructure Are Real
Defending against the combination of human and technical exploits requires the collaboration of human and technical security defenses.

Who Took The Cookies From The Cookie Jar?
The indictment of five Iranian hackers three years after the fact raises the question: Is naming them a worthwhile part of the threat defense lifecycle, or is it a meaningless distraction?

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.