Follow Dark Reading:
 November 02, 2016
LATEST SECURITY NEWS & COMMENTARY
ShadowBrokers Release More Alleged Equation Group Data
Data purports to show configuration details of servers that NSA allegedly hacked and used to host exploits
Google Adwords Malvertising Campaign Targets Apple Macs
Cheeky attackers make their lure an ad for Google Chrome.
Why Enterprise Security Teams Must Grow Their Mac Skills
From coffee shops to corporate boardrooms, Apple devices are everywhere. So why are organizations so doggedly focused on Windows-only machines?
7 Security Lessons The Video Game Industry Can Teach IoT Manufacturers
The Internet of Things has alarming holes in security. The industry should look to video games for some answers.
Here Are Some Scary Stats About Windows Devices
DuoSecurity analyzes Windows endpoints used by its customers and finds some dusty old applications in use.
Anthem Breach Victims Go To Court Over Cybersecurity Audit Release
Class-action lawsuit against health insurer seeks disclosure of network security details following data breach of 80 million members.
Ex-FBI Chief Reviews Security For Booz Allen After NSA Contractor Arrest
Robert Mueller hired after Booz Allen staff arrested for allegedly stealing classified information at NSA.
MORE NEWS & COMMENTARY
HOT TOPICS
5 Signs Your Smartphone Has Been Hacked
Mobile devices are increasingly popular vectors for cybercriminals targeting the enterprise. How to tell when a smartphone may be under attack.

'AtomBombing' Microsoft Windows Via Code Injection
Researchers have identified a new way to inject malicious code into Windows systems -- and it doesn't exploit a vulnerability.

20 Endpoint Security Questions You Never Thought to Ask
The endpoint detection and response market is exploding! Here's how to make sense of the options, dig deeper, and separate vendor fact from fiction.

MORE
EDITORS' CHOICE

7 Reasons Consumers Don't Take Action on Cybersecurity
Security awareness is high but it's hard to turn personal knowledge into effective practices.
LIVE FROM DARK READING NEWS DESK AT BLACK HAT USA

Preparing For Government Data Requests After Apple Vs. FBI
Jennifer Granick and Riana Pfefferkorn discuss lessons learned from the Apple-FBI case, and how security pros should be prepared if government data requests hit closer to home.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Outsmart Ransomware Attacks with the Right Protection Strategy

    No longer content to just steal data, criminals are deploying ransomware everywhere and holding businesses hostage on a daily basis. To minimize the fallout of an eventual attack, Security and IT teams need to think and respond differently, and Boards ...

  • DarkReading Virtual Event: Re-Thinking IT Security Strategy

    Despite enterprises spending more money annually on cybersecurity defense than ever before, the number of businesses compromised continues to increase. Today's approach to data defense isn't where it needs to be and it's time for all enterprises, including yours, to ...

MORE WEBINARS

Partner Perspectives

We Must Become Good Digital Citizens
Digital citizenship carries many capabilities and benefits, but there also have to be some rules and responsibilities.

Warning: Healthcare Data Under Attack
We as an industry must demand greater protection of our medical data.

Let's Clean Up The Internet By Taking Responsibility For Our Actions
Imagine an Internet with multiple levels of security that users need to earn.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.