Follow Dark Reading:
 October 10, 2017
LATEST SECURITY NEWS & COMMENTARY
SiteLock: Website Attacks Surged 186% in Q2
Websites mostly belonging to small- to midsized firms got hit with more than 60 attacks per day on average, new analysis finds.
New 4G, 5G Network Flaw 'Worrisome'
Weaknesses in the voice and data convergence technology can be exploited to allow cybercriminals to launch DoS attacks and hijack mobile data.
More Businesses Accidentally Exposing Cloud Services
53% of businesses using cloud storage services unintentionally expose them to the public.
Rise in Insider Threats Drives Shift to Training, Data-Level Security
As the value and volume of data grows, perimeter security is not enough to battle internal or external threats.
MORE NEWS & COMMENTARY
HOT TOPICS
Russian Hackers Pilfered Data from NSA Contractor's Home Computer: Report
Classified information and hacking tools from the US National Security Agency landed in the hands of Russian cyberspies, according to a Wall Street Journal report.

Ransomware Will Target Backups: 4 Ways to Protect Your Data
Backups are the best way to take control of your defense against ransomware, but they need protecting as well.

DNS a 'Victim of its Own Success'
Why securing the Domain Name System remains an afterthought at many organizations.

MORE
EDITORS' CHOICE

10 Steps for Writing a Secure Mobile App
Best practices to avoid the dangers of developing vulnerability-ridden apps.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Ransomware: Latest Developments & How to Defend Against Them

    Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly are just around the corner. Learn how ransomware can affect your organization and steps you can take to defend your systems and users against ...

  • 4 Key Steps in Implementing the Data Warehouse of the Future

    Today organizations need performance and flexibility at an affordable price. A Hadoop-based environment offers just that: speed, scalability, and flexibility while minimizing disruption to a company. Join this session to learn how to implement the technology gradually, target the right ...

MORE WEBINARS

Partner Perspectives

URL Obfuscation: Still a Phisher's Phriend
There are three primary techniques to trick users into thinking a website link is real: URL shorteners, URL doppelgangers, and URL redirects.

TrickBot Rapidly Expands its Targets in August
TrickBot shifted its focus to U.S banks and credit card companies, soaring past the 1,000 target URL mark in a single configuration.

Where Do Security Vulnerabilities Come From?
There are three major causes: code quality, complexity, and trusted data inputs.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.