SpammerGate: The takeaway lessons and follow-ups on the River City Media data breach

Email not displaying correctly? View it in your browser.

CSO

CSO Newswatch

Mar 10, 2017
Featured Image

After CIA leak, Intel Security releases detection tool for EFI rootkits

Intel Security has released a tool that allows users to check if their computer's low-level system firmware has been modified and contains unauthorized code. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

SpammerGate: The takeaway lessons and follow-ups on the River City Media data breach
Google tries to beat AWS at cloud security
WikiLeaks will share CIA hacking details with companies, but can they use it?
Newer car tech opens doors to CIA attacks

Video/Webcast: Hewlett Packard Enterprise

Your Digital Transformation Journey

How will you go about enabling digital transformation at your company? Joining two experts on digital transformation as they discuss what's at stake and how you can enable digital transformation at your company with the help of open source software. Read More

Thumbnail Image

SpammerGate: The takeaway lessons and follow-ups on the River City Media data breach

Earlier this week, Salted Hash reported on the River City Media data breach, which exposed their operations fully. Today's follow-up examines some lessons learned, and few of the tools used by the company during their spamming campaigns. Read More

Thumbnail Image

Google tries to beat AWS at cloud security

New tools that protect enterprise applications running on Google Cloud Platform may help take the spotlight away from AWS and Microsoft Azure Read More

Thumbnail Image

WikiLeaks will share CIA hacking details with companies, but can they use it?

WikiLeaks plans to share details about what it says are CIA hacking tools with the tech companies so that software fixes can be developed. But will software companies want it? Read More

Thumbnail Image

Newer car tech opens doors to CIA attacks

The revelation that the CIA has looked into hacking vehicles, possibly for the purpose of assassinations, flies in the face of a presidential order requiring U.S. agencies to reveal flaws to manufacturers to protect Americans. Read More

White Paper: Veeam Software Corporation

Data Availability Without Limits

In this white paper, you'll learn about the requirements driving the need for increased availability, less complexity and improved reliability. Then you'll see how Veeam software and Hewlett Packard Enterprise solutions can help you meet your availability objectives, future-proof your data center investment, and gain capabilities that provide data protection without limits to meet your always-on business needs. Read More

Top 5 Stories

1. Spammers expose their entire operation through bad backups
2. The 10 essential Reddits for security pros
3. Ransomware picks off broader targets with greater severity
4. Why the Ukraine power grid attacks should raise alarm
5. Why awareness needs to teach scam detection and reaction

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Newswatch as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.