Follow Dark Reading:
 June 14, 2017
LATEST SECURITY NEWS & COMMENTARY
The Rising Tide of Crimeware-as-a-Service
Malware, botnets, phishing and backdoors are all offered on the cheap as subscription. These days even crime is in the cloud.
Businesses Spend 1,156 Hours Per Week on Endpoint Security
Insecure endpoints cost businesses millions of dollars, and hours of productivity, as they struggle to detect and contain threats.
How Bad Data Alters Machine Learning Results
Machine learning models tested on single sources of data can prove inaccurate when presented with new sources of information.
Deep Learning's Growing Impact on Security
Neural networks are now practical for real-world applications, cutting back on work needed from analysts.
Europol Operation Busts Payment Card Identity Theft Ring
Members of an international crime ring of payment card skimmers who stole more than $500,000 were arrested by a joint multi-national law enforcement operation.
WannaCry 'Scareware' Driving Downloads of Bogus Anti-Virus Apps
Fake anti-virus apps account for 12.2% of active AV apps in the Google Play store, of which roughly one in 10 are blacklisted, according to a report released today.
A Former FBI Most Wanted Cybercriminal is Extradited to US
The Latvian man is charged with four counts of wire fraud and unauthorized computer use in a "scareware" scheme that netted more than $2 million.
MORE NEWS & COMMENTARY
HOT TOPICS
How End-User Devices Get Hacked: 8 Easy Ways
Security experts share the simplest and most effective methods bad guys employ to break into end-user devices.

Cybersecurity Faces 1.8 Million Worker Shortfall By 2022
(ISC)2 report shows the skills shortage is getting worse.

The Detection Trap: Improving Cybersecurity by Learning from the Secret Service
Intruders often understand the networks they target better than their defenders do.

MORE
EDITORS' CHOICE

The Dark Reading Security Spending Survey
Enterprises are spending an unprecedented amount of money on IT security - where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download the report and find out what they had to say.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Open Source Software: The Infrastructure Impact

    Open source technology is gaining ground throughout IT and especially in operating systems and databases. Open source software drives efficiency and innovation, but affects your application stacks and introduces new challenges to keeping them highly available and performing. Find out ...

  • AI & Machine Learning: Real World Use Cases

    At this event you will get real-world use cases for machine learning in business and industry, designed to spark your thinking as you examine your first, or second, or 27th, implementation of this advanced technology in your organization. Find out ...

MORE WEBINARS

Partner Perspectives

Ditch the Big Ass Spreadsheet with Continuous Security Compliance
Replacing outdated spreadsheets with automated, continuous monitoring reduces workload and increases reliability, making compliance easy.

Hide & Seek: Security Teams Lack Visibility in the Cloud
IT leaders remain on the hot seat when it comes to their ability to continuously monitor the state of their data and operations. How hot is your seat?

Will Deception as a Defense Become Mainstream?
If your organization has the right resources, deception strategies offer a powerful way to slow down and entrap potential intruders.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.