Follow Dark Reading:
 October 13, 2016
LATEST SECURITY NEWS & COMMENTARY
Russia, Russia, Russia: What Clinton Or Trump Can Do About Nation-State Hacking Gone Wild
US mulls 'proportional' response to Democratic Party hacks in midst of an unprecedented presidential campaign clouded by cybersecurity concerns (among other things).
Certifying Software: Why We're Not There Yet
Finding a solution to the software security and hygiene problem will take more than an Underwriter's Lab seal of approval.
Political Positions On Cybersecurity Matter To Millennials
New study on millennials and cybersecurity points to a growing awareness of the field, an interest in pursuing careers in security, and the influence of cybersecurity in politics.
Attack Uses Image Steganography For Stealthy Malware Ops On Instagram
Endgame details 'Instegogram' and Apple Mac OS X flaw with Instagram images.
Attackers Exploit Weak IoT Security
Akamai researchers say attackers are using an old OpenSSH vulnerability to target IoT devices and launch attacks.
US-CERT Cautions Against Phishing Scams In Aftermath Of Hurricane Matthew
The government agency for cyber protection provides steps to follow before opening links or attachments with Hurricane Matthew tag.
G7 Nations Plan To Team Up To Tackle Financial Cybercrime
Group of Seven nations' new guidelines include sharing updates by governments, private firms and regulators, plus joint address of shortfalls.
MORE NEWS & COMMENTARY
HOT TOPICS
Ransomware Raises The Bar Again
The infamous form of attack now ranks as the top threat to financial services, but preparedness can pay off for victims.

Inside A Bug-Hunter's Head: 6 Motivators
Who are bug bounty hunters, and why do they hack? We dig inside the motivators driving today's hackers to seek vulnerabilities.

Database Breaches: An Alarming Lack Of Preparedness
It's no secret that databases are fertile ground for malicious activities. Here's how a seven-step process for monitoring known harbingers of an imminent attack can help reduce the risk.

MORE
EDITORS' CHOICE

Executable Files, Old Exploit Kits Top Most Effective Attack Methods
Researchers for the new 'Hacker's Playbook' analyzed 4 million breach methods from an attacker's point of view to gauge the real risks today to enterprises.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Visualization: Let Your Data Speak

    Your data analytics project doesn't really achieve a successful completion until you deliver the results to decision makers, whether the recipients are top executives, business unit leaders, or even the public at large. More and more data science teams are ...

  • Re-Thinking Your Enterprise IT Security Strategy

    Despite enterprises spending more money annually on cybersecurity defense than ever before, the number of businesses compromised continues to increase. Today's approach to data defense isn't where it needs to be and it's time for all enterprises, including yours, to ...

MORE WEBINARS

Partner Perspectives

Cybersecurity Economics In Government -- Is Funding The Real Problem?
Government leadership and those chartered with creating budgets could benefit from applying sound value-management practices when considering the cybersecurity budget process.

Cyber-Anything-As-A-Service: Should The Government Just Outsource Everything?
Agencies should be able to select and provision from a variety of cybersecurity services and capabilities to improve their overall effectiveness and efficiency.

'Beep' Prepared: How Security Economics Can Help The Coyote Catch The Roadrunner
The practice of security economics demonstrates how gaps in the security architecture impair business results.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.