Follow Dark Reading:
 March 30, 2018
LATEST SECURITY NEWS & COMMENTARY
US Election Swing States Score Low Marks in Cybersecurity
C and D grades for Florida, Michigan, New Hampshire, Nevada, and Ohio, SecurityScorecard assessment shows.
Deconstructing the DOJ Iranian Hacking Indictment
The alleged attackers used fairly simple tools, techniques and procedures to compromise a new victim organization on an almost weekly basis for over five years.
University Networks Become Fertile Ground for Cryptomining
Sixty percent of cryptomining detections in a Vectra study occurred on higher-education networks.
MITRE Evaluates Tools for APT Detection
A new service from MITRE will evaluate products based on how well they detect advanced persistent threats.
FBI IC3: Tech Support Scam Losses Rose 86% in 2017
Most victims are in the US, but FBI IC3 has logged cases from 85 different countries.
WannaCry Re-emerges at Boeing
Computers at the aerospace giant were hit by the WannaCry malware but systems are back to normal
MORE NEWS & COMMENTARY
HOT TOPICS
New Ransomware Attacks Endpoint Defenses
AVCrypt tries to disable anti-malware software before it can be detected and removed.

Bad Bots Increasingly Hide Out in Cloud Data Centers
Humans accounted for nearly 58% of website traffic in 2017 -- the rest were bad and good bots.

Attackers Shift From Adobe Flaws to Microsoft Products
Seven of the Top 10 most commonly exploited vulnerabilities in 2017 were Microsoft-related - not Adobe Flash as in years past, Recorded Future found.

MORE
EDITORS' CHOICE

8 Security Spring Cleaning Tips for the Home Office
Use these ideas to sharpen up your home office machine against potential intruders.
The Overlooked Problem of 'N-Day' Vulnerabilities
N-days -- or known vulnerabilities -- are a goldmine for attackers of industrial control systems. It's time for a new defense strategy.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Deconstructing a Business Email Compromise Attack
How a tech-savvy New Jersey couple outwitted a German hacker group and saved their home and life savings.

Getting Ahead of Internet of Things Security in the Enterprise
In anticipation of an IoT-centric future, CISOs must be rigorous in shoring up defenses that provide real-time insights across all network access points.

Applications & Identities Initial Targets in 86% of Breaches: Report
The startling numbers of breached data are sobering: 11.8 billion records compromised in 337 of 433 incidents examined by F5 researchers. They include 10.3 billion usernames, passwords, and email accounts.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.