Follow Dark Reading:
 October 25, 2016
LATEST SECURITY NEWS & COMMENTARY
'Root' & The New Age Of IoT-Based DDoS Attacks
Last Friday's massive DDoS that exploited online cameras and DVRs was simple to pull off -- and a new chapter in online attacks.
5 Tips For Preventing IoT Hacks
The recent DDoS attack on Dyn was powered in part by a bot army of home devices. How not to let your webcam or other IoT system go rogue.
Microsoft's New Patch Tuesday Model Comes With Benefits And Risks
Microsoft has transitioned its Patch Tuesday update process to a cumulative rollup model. What businesses need to know about the new patching regimen.
New Kovter Trojan Variant Spreading Via Targeted Email Campaign
The authors of a malware sample that has been around for more than two years have yet another trick for distributing it.
Deleting Email's Original Sin: An Historical Perspective
Can DMARC do for email security what SSL certificates did for e-commerce?
New Financial System Analysis & Resilience Center Formed
Associated with Financial Services ISAC (FS-ISAC), the new FSARC works more closely with government partners for deeper threat analysis and systemic defense of financial sector.
MORE NEWS & COMMENTARY
HOT TOPICS
DDoS Attack On DNS Provider Disrupts Okta, Twitter, Pinterest, Reddit, CNN, Others
Brief but widespread attack illuminated vulnerability of the Internet's Domain Name System (DNS) infrastructure.

Identity Theft Hits Low- To Moderate-Income Victims Hardest
In addition to government assistance, ID theft victims frequently seek financial support from friends, family, and faith-based organizations, according to a study by the Identity Theft Resource Center.

Malvertising Trends: Don't Talk Ad Standards Without Ad Security
How malvertising marries the strengths and weaknesses of the complex digital advertising ecosystem perfectly - and what online publishers and security leaders need to do about it.

MORE
EDITORS' CHOICE

7 Imminent IoT Threats
Attacks against smart home products, medical devices, SCADA systems, and other newly network-enabled systems signal the beginning of a new wave of attacks against the IoT.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Vendor Security Alliance To Improve Cybersecurity Of Third-Party Providers
Member companies can use their VSA rating when offering their services, effectively skipping the process of verification done by prospective businesses.

Why Aren't We Talking More Proactively About Securing Smart Infrastructure?
Let's not perpetuate the vicious cycle of security complexity and failure by trying to bolt on security after the fact.

Access, Trust, And The Rise Of Electronic Personal Assistants
App and device makers are working hard to deliver user control over privacy.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.