Follow Dark Reading:
 July 20, 2016
LATEST SECURITY NEWS & COMMENTARY
Remote Systems Admin Software Rigged With Lurk Trojan
Website of legitimate and popular application used by banks in Russia and nearby nations faced successive compromises.
Deconstructing Connected Cars: A Hack Waiting To Happen
Why your automobile's simple and reliable Controller Area Network will put you at risk in the brave new world of connected and autonomous driving.
Hacker Jailed For Celebrity Swatting, Doxing
New Yorker Mir Islam given a two-year jail term for online harassment of public figures.
Ubuntu Forums Database Hacked
Canonical probe reveals user account details of 2 million stolen, passwords safe.
MORE NEWS & COMMENTARY
HOT TOPICS
Meet The Teams In DARPA's All-Machine Hacking Tournament
"Autonomous security" is DARPA's latest game. Its Cyber Grand Challenge will culminate at DEF CON with a contest to see which of these seven finalists' machines will automatically detect and remediate the most security vulnerabilities.

Beyond Data: Why CISOs Must Pay Attention To Physical Security
Information security professionals are missing the big picture if they think of vulnerabilities and threats only in terms of data protection, password hygiene and encryption.

Cartoon Caption Contest

We provide the cartoon. You write the caption. Win a $25 Amazon Gift card!

MORE
EDITORS' CHOICE

What SMBs Need To Know About Security But Are Afraid To Ask
A comprehensive set of new payment protection resources from the PCI Security Standards Council aims to help small- and medium-sized businesses make security a priority.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Millennials are Changing the Definition of Customer Care

    Millennials know exactly what they want and expectations are high - very high. They are empowered in their personal life and demand the same in business. Because they are always on and always connected, using everything from mobile devices to ...

  • Analytics & the Making of a President

    Join All Analytics Radio to learn about the use of analytics in presidential campaigns. What you learn by attending can provide insight into what the candidates know about you and millions of other citizens, and it can demonstrate what your ...

MORE WEBINARS

Partner Perspectives

Context-Rich And Context-Aware Cybersecurity
An adaptive threat-prevention model is quickly replacing traditional, unintegrated architectures as security teams work to achieve a sustainable advantage against complex threats.

Saving The Security Operations Center With Endpoint Detection And Response
EDR is the beginning of our return to control in the fight against cybercrime.

Shifting The Economic Balance Of Cyberattacks
Our goal should be to simply make the cost of conducting a cyberattack so expensive that cybercriminals view attacking our organization as a bad return on investment.

FEATURED REPORTS
  • Forrester Report: Cloud Powers The New Connected Economy

    This May 2016 Forrester report explores a landscape in which organizations in every industry are moving forward from cloud adoption to cloud creation and participation. Learn how you are a member of this networked economy & how the steps you take may ...

  • Gartner Magic Quadrant for Operational Database Management

    When it comes to managing your data, the choice is clear: Microsoft is an industry leader in operational database management systems (ODBMS). Don't take our word for it; read Gartner's assessment of the ODBMS landscape and see how Microsoft stacks ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.