Follow Dark Reading:
 December 28, 2017
LATEST SECURITY NEWS & COMMENTARY
The Coolest Hacks of 2017
Robots, voting machines, machine learning, and the wind were among the hacks security researchers pulled off this year.
The Financial Impact of Cyber Threats
Determining the financial impact of specific IT vulnerabilities is a good way to prioritize remediation and prevent attacks.
Nissan Canada Finance Alerts 1.13 Million Customers of Data Breach
Attackers gain access to personal information of Nissan Canada Finance and Infiniti Financial Services Canada customers.
Hacker Targeted Huawei Router 0-Day in Attempt to Create New Mirai Botnet
Thousands of attempts have been made to exploit a zero-day vulnerability in the Huawei home router HG532.
MORE NEWS & COMMENTARY
HOT TOPICS
Top 8 Cybersecurity Skills IT Pros Need in 2018
Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring.

Fileless Malware Attacks Hit Milestone in 2017
Non-malware attacks account for the majority of all attacks this year, and ransomware grows to a $5 billion industry, new data shows.

Russia's Fancy Bear APT Group Gets More Dangerous
Encryption and code refreshes to group's main attack tool have made it stealthier and harder to stop, ESET says.

MORE
EDITORS' CHOICE

6 Tips to Protect Against Technical Support Fraud
Just when you're having fun over the holidays and not paying attention, you can be hit with a tech support scam. Here's how to stay safe into the new year.
2017 Security Predictions through the Rear Window
If you're going to forecast the future, go big.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Be a More Effective CISO by Aligning Security to the Business
These five steps will you help marshal the internal resources you need to reduce risk, break down barriers, and thwart cyber attacks.

Is a Good Offense the Best Defense Against Hackers?
A proposed new law could make it legal for companies to hack back against attacker. But will it work?

Why Third-Party Security Is your Security
Managing third-party risk isn't just a good idea, in many cases, it's the law. This security framework can help you minimize the threat.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.