Follow Dark Reading:
 April 28, 2017
LATEST SECURITY NEWS & COMMENTARY
Verizon DBIR Shows Attack Patterns Vary Widely By Industry
It's not always the newest or the most sophisticated threat you need to worry about, Verizon's breach and security incident data for 2016 shows.
Iranian Hackers Believed Behind Massive Attacks on Israeli Targets
OilRig aka Helix Kitten nation-state group leveraged Microsoft zero-day bug in targeted attacks.
Facebook Spam Botnet Promises 'Likes' for Access Tokens
Facebook users can fuel a social spam botnet by providing verified apps' access tokens in exchange for "likes" and comments.
Microsoft Updates Foreign Surveillance Request Count
Microsoft received 0-499 surveillance requests from January to June 2016, correcting an earlier report stating orders spiked to 1,000-1,499.
IRS and Immigration Officials Impersonated in Call Center Scam
A call center in India was used to scare US residents with threats of imprisonment and deportation in a ruse that impersonated US officials.
MORE NEWS & COMMENTARY
HOT TOPICS
INTERPOL Operation Sweeps Up Thousands of Cybercrime Servers Used for Ransomware, DDoS, Spam
Massive public-private 'cyber surge' in Asia identifies hundreds of compromised websites in operation that spans multiple cybercriminal groups, activities.

The Road Less Traveled: Building a Career in Cyberthreat Intelligence
It's hard to become a threat intelligence pro, but there are three primary ways of going about it.

A Closer Look at CIA-Linked Malware as Search for Rogue Insider Begins
Symantec researcher explains the goals behind CIA-linked hacking tools, as the government launches an investigation to discover who gave secret documents to WikiLeaks.

MORE
POINT-COUNTERPOINT

New OWASP Top 10 Reveals Critical Weakness in Application Defenses
It's time to move from a dependence on the flawed process of vulnerability identification and remediation to a two-pronged approach that also protects organizations from attacks.
OWASP Top 10 Update: Is It Helping to Create More Secure Applications?
What has not been updated in the new Top 10 list is almost more significant than what has.
EDITOR'S CHOICE

6 Steps to Find Your Next Dozen Cloud Security Experts
There's stiff competition for cloud security experts, but finding yours may actually be easier than you think.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Research Results Revealed: The State of Analytics

    How does your analytics initiative shape up? Are you keeping pace with your peers in other organizations? Do you have data scientists in lead roles? Are you driving innovation with data? Have you embarked on Internet of Things (IoT) projects? ...

  • Cloud Security: Myths & Reality

    Enterprises are expanding their use of cloud services and cloud applications every day - but what are the security implications? Are cloud environments less secure than traditional enterprise networks? What can enterprises do to protect critical data in these cloud ...

MORE WEBINARS

Partner Perspectives

Locky Returns with a New (Borrowed) Distribution Method
A layered defense is a strong security posture for dealing with a threat like Locky, that can come in different disguises.

Cybercrime Tactics & Techniques: Q1 2017
A deep dive into the threats that got our attention during the first three months of the year - and what to expect going forward.

Securing your Privacy on Android
If you work at a company that allows you to use your mobile device to login to email, access company data, or connect to company Wi-Fi, you're more of a security risk than you think.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.