Follow Dark Reading:
 March 24, 2016
LATEST SECURITY NEWS & COMMENTARY
Multiple Hospitals Hit In Ransomware Attack Wave
In the past week alone, three hospitals have reported being victimized by cyber-extortionists.
IRS Tax Fraud And Phishing Advances
New techniques and automation have bad guys making more money than ever off of unsuspecting taxpayers.
Think Risk When You Talk About Application Security Today
Security from a risk-based perspective puts the focus on component failures and provides robust security for the ultimate target of most attacks -- company, customer and personal data.
QUICK HITS

Uber Launches Bug Bounty Program
Uber in collaboration with HackerOne, will reward ethical hackers up to $10,000 for finding vulnerabilities in its software.
DOJ Charges 3 Syrian Electronic Army (SEA) Hackers
US authorities issue arrest warrants for suspects who are believed to have played crucial roles in cyberattacks by the SEA.
MORE NEWS & COMMENTARY
HOT TOPICS
Here Are 4 Vulnerabilities Ransomware Attacks Are Exploiting Now
A zero-day exploit exposed in the Hacking Team breach is among the top weapons deployed in recent ransomware attacks, as well as lots of Flash.

FBI's Claim It Can Access iPhone Without Apple's Help Prompts Questions
In a surprise development, feds say they may have found another way to access the iPhone recovered from a San Bernardino terror suspect.

Tell DR: What Are Your Biggest Unanswered Security Questions?
Fill us in, Dark Reading community. What challenges and mysteries leave you scratching your heads and throwing up your hands?

MORE
EDITORS' CHOICE

What The Feds Said At RSA
A look at some of the insights top US government officials from the White House, DoD, NSA, FBI, and other agencies shared at the RSA Conference in San Francisco last month.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Who Took The Cookies From The Cookie Jar?
The indictment of five Iranian hackers three years after the fact raises the question: Is naming them a worthwhile part of the threat defense lifecycle, or is it a meaningless distraction?

Data In The Cloud: What Everyone Should Know
When vetting a cloud or SaaS provider, it is imperative that you find out how they handle data security and privacy. Here are some key questions to ask.

Knowledge Gap Series: The Myths Of Analytics
It may not be rocket science, but it is data science.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.