Follow Dark Reading:
 May 11, 2017
LATEST SECURITY NEWS & COMMENTARY
SLocker Ransomware Variants Surge
SLocker, one of the top 20 Android malware families, has seen a six-fold increase in the number of new versions over the past six months.
Businesses Not Properly Securing Microsoft Active Directory
Businesses overlook key security aspects of AD, leaving sensitive data open to external and internal attacks, new study shows.
The Long Tail of the Intel AMT Flaw
Organizations impacted by easily exploitable privilege escalation vulnerability may need time to apply firmware patches, analysts say.
Extreme Makeover: AI & Network Cybersecurity
In the future, artificial intelligence will constantly adapt to the growing attack surface. Today, we are still connecting the dots.
Your IoT Baby Isn't as Beautiful as You Think It Is
Both development and evaluation teams have been ignoring security problems in Internet-connected devices for too long. That must stop.
'Systemic' Cyberattack Most Likely to Hit Financial, Energy Sectors
The financial services industry is among the top five industries that likely face a systemic cyberattack, according to a survey released today.
FTC Launches Cybersecurity Resource Website for SMBs
Federal Trade Commission website offers free tips and information for small businesses.
MORE NEWS & COMMENTARY
HOT TOPICS
New IoT Botnet Discovered, 120K IP Cameras At Risk of Attack
The Persirai IoT botnet, which targets IP cameras, arrives hot on the heels of Mirai and highlights the growing threat of IoT botnets.

And Now a Ransomware Tool That Charges Based On Where You Live
Malware is designed to charge more for victims in countries with a higher cost of living, Recorded Future says.

Backdoors: When Good Intentions Go Bad
Requiring encrypted applications to provide backdoors for law enforcement will weaken security for everyone.

MORE
EDITORS' CHOICE

10 Free or Low-Cost Security Tools
At a time when many organizations struggle with security funding, open-source tools can help cut costs for certain businesses.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cyber-Attacks: Midsize Companies Think They're Safe - They Aren't

    Midsized companies are becoming an increasing hot spot for cyber-attacks. They face the same APTs and attacks as large enterprises, but have weaker defenses due to lack of resources and/or budgets. Weak defenses create not only the opportunity for ...

  • IT Leader's Guide to the Cybersecurity Landscape

    Thanks to a never-ending stream of major and well-publicized data breaches, security has become one of the most critical issues in IT. Attend this webinar to learn about chief threats that IT organizations face, how they can impact your systems ...

MORE WEBINARS

Partner Perspectives

Malspam Causing Havoc for Mac & Windows
Spam is a multi-platform, multi-vector approach to network compromise, and organizations need to weigh up the risks on all fronts to be able to combat it successfully.

OSX.Bella: Mac Malware Strikes Again
This variant of the OSX.Dok dropper behaves altogether differently, and installs a completely different payload.

Locky Returns with a New (Borrowed) Distribution Method
A layered defense is a strong security posture for dealing with a threat like Locky, that can come in different disguises.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.