Data enrichment records for 200 million people up for sale on the Darknet

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Dec 14, 2016
Featured Image
INSIDER

5 tips to stay ahead of ransomware threats

Ransomware is on the rise and promises to be an even bigger threat in 2017. Here are five ways to protect against attacks. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Data enrichment records for 200 million people up for sale on the Darknet
53% off Apple USB-C to USB Adapter - Deal Alert
Cybersecurity skills aren’t taught in college
Nearly half of all websites pose security risks
Yogi Berra was never in the cybersecurity business
The time for a national cyber Skunk Works is now!
My obligatory 2017 predictions

White Paper: Protegrity

4 Security Drivers for Data-Driven Financial Institutions

It is clear that for financial services institutions (FSIs) becoming data centric is an ever increasing priority. Doing this well requires FSIs be able to securely blend data from a broad set of data sources. FSIs that get their data act together will have the agility to enhance consumer and employee intimacy, grow customer share, ensure regulatory compliance and minimize business risk. Read More

Thumbnail Image

Data enrichment records for 200 million people up for sale on the Darknet

Full data enrichment profiles for more than 200 million people have been placed up for sale on the Darknet. The person offering the files claims the data is from Experian, and is looking to get $600 for everything. Read More

Thumbnail Image
DealPost

53% off Apple USB-C to USB Adapter - Deal Alert

This USB 2.0 cable connects your iPhone, iPad, or iPod with Lightning connector to your computer's USB port for syncing and charging, or to the Apple USB Power Adapter for convenient charging from a wall outlet. Currently discounted 53% to just $9. Read More

Thumbnail Image

Cybersecurity skills aren’t taught in college

Cybersecurity threats are increasing each year, but businesses report shortage of qualified candidates coming out of undergraduate programs. Preparing the next generation of cybersecurity experts won't be a quick fix, so business will need to get strategic. Read More

Thumbnail Image

Nearly half of all websites pose security risks

According to a new study of the top one million domains, 46 percent are running vulnerable software, are known phishing sites, or have had a security breach in the past twelve months. Read More

Thumbnail Image

Yogi Berra was never in the cybersecurity business

It's tough to make predictions, especially about the future. Except one: Your company will get hacked in 2017. Cyberattacks are so common and so discrete that it's virtually a sure thing that hackers will at least probe, and probably penetrate your defenses to breach your security. Read More

Thumbnail Image

The time for a national cyber Skunk Works is now!

Cybersecurity leadership consultant Stephen Spagnuolo @SASLeadershp of ZRG Partners @ZRGPartners lays out a road map for a collective battle effort . . . Transitioning from a burgeoning industry with still “wild west” market tendencies to a dynamic force that is vastly more interconnected and accessible and yet maintains its core entrepreneurial operating spirit. This is a new kind of war we’re collectively fighting. Read More

Thumbnail Image

My obligatory 2017 predictions

Tis the information security season to make predictions about what security year 2017 will bring. Read More

Case Study: Avaya

A Top-20 US Credit Union Puts Customers at the Center of Everything They Do

Having a customer-centric culture means a big focus on providing consistently strong customer service. Not long ago, the credit union launched a new internet banking service, which resulted in a significant uptick in call volumes to the call center. Some members calling in were not hearing the correct recorded announcements. A call was put in to Avaya Support.

Read what happened next. Read More

Top 5 Stories

1. Netgear working to fix flaw that left thousands of devices open to attack
2. Nearly half of all websites pose security risks
3. Trump's margin up after Wisconsin recount over voting machine security
4. Data enrichment records for 200 million people up for sale on the darknet
5. How to secure your router and home network

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.