Follow Dark Reading:
 September 30, 2016
LATEST SECURITY NEWS & COMMENTARY
Researchers Shoot Down Yahoo Claim Of Nation-State Hack
InfoArmor says the attackers who stole a half-billion Yahoo user accounts were seasoned cybercriminals who later sold the booty to an Eastern European nation-state.
EMV: The Anniversary Of One Deadline, The Eve of Another
How merchants and criminals responded since the EMV liability shift for point-of-sale devices one year ago. And what changes can we expect after the liability shift for ATMs, which is just days away?
Decrypting The Dark Web: Patterns Inside Hacker Forum Activity
Data analysis to be presented at Black Hat Europe highlights trends in communication between bad actors who gather in underground forums across the Dark Web.
How A Pair Of Cybercriminals Scales Its Carder Business
'Vendetta Brothers' cybercrime duo runs site that offers cards stolen from over 600 banks in 41 countries, FireEye says.
Fear & Loathing In The Cloud
Whether you've already bought your ticket for the cloud or still have some issues to sort through, fine-tune your security practices to make sure your ride is a smooth one.
A Bug Bounty Reality-Check
New study shows that bug bounties without a secure application development program and testing can be costly.
MORE NEWS & COMMENTARY
HOT TOPICS
The Real Reasons Why Users Stink At Passwords
Personality, denial, and authentication-overload are big factors, new study finds.

Top Democrats Tell Putin To Halt Hacking Of US Political Parties
Russia trying to influence November presidential elections, say Senator Dianne Feinstein and Rep. Adam Schiff.

Mobile Fraud Changes Outlook for Multifactor Authentication
SMS one-time passcodes just won't cut it anymore. We need new approaches that people will actually use.

MORE
FEATURED VIDEO FROM DARK READING NEWS DESK AT BLACK HAT


Taking Down Impersonators: Methods For Combating Email Fraud
Bob Adams, cybersecurity strategist at Mimecast, stops by the Black Hat News Desk.

EDITORS' CHOICE

25 Emerging Security Vendors To Watch
A wave of companies is entering the security field armed with technologies to help businesses mitigate the next generation of cyberattacks. Who are these emerging vendors and what can they offer?
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

'Beep' Prepared: How Security Economics Can Help The Coyote Catch The Roadrunner
The practice of security economics demonstrates how gaps in the security architecture impair business results.

Sharing Cybersecurity Threat Intelligence Is The Only Way We Win
Security organizations must leverage each other's information in order to better predict, prevent, detect, and respond to threats their customers and organizations face.

Ransomware: Coming To A Hospital Near You?
10 ways to protect healthcare systems from ransomware and other malware infections.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.