Inside a phishing attack: What the criminal sees

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

May 29, 2018
Featured Image

Alexa, stop eavesdropping and sending recorded conversations to other people!

Even if your Echo hasn't sent secretly recorded messages to one of your contacts, have you checked to see what recorded conversations are in your Alexa app history? Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Inside a phishing attack: What the criminal sees
$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert
What does a ransomware attack cost? Beware the hidden expenses
FBI: Reboot your home and small office routers to counter Russian malware
Cato Networks adds threat hunting to its SD-WAN services
Join us at SecurIT: The Zero Trust Summit

White Paper: Palo Alto Networks

10 Things Your Next Firewall Must Do

As the leader and pioneer of the next-generation firewall category, Palo Alto Networks would like to share what we have learned from securing over 3,500 enterprise networks in the past few years. Download our guide that depicts the top 10 requirements you should demand in your next firewall purchase. Read More

Thumbnail Image

Inside a phishing attack: What the criminal sees

In April, TSB (a retail and commercial bank in the UK) announced they would shutdown some systems for an IT upgrade. However, the upgrade was a disaster, and over a month later customers are still having problems. As a result, criminals have turn to phishing in order to capitalize on the chaos created by the botched IT upgrade. Read More

Thumbnail Image
DealPost

$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More

Thumbnail Image

What does a ransomware attack cost? Beware the hidden expenses

The ransom is only a tiny portion of the total cost of a ransomware attack. Consider these associated costs when estimating the total damage. Read More

Thumbnail Image

FBI: Reboot your home and small office routers to counter Russian malware

The FBI, DHS and DoJ advised rebooting your router to clear it from advanced stages of the Russian-linked malware VPNFilter. The malware infecting SOHO routers and NAS devices is linked to the Russian military-backed hackers Sofacy Group, aka Fancy Bear and APT 28. Read More

Thumbnail Image

Cato Networks adds threat hunting to its SD-WAN services

Cato Threat Hunting System includes algorithms and procedures to alert on threats -- without adding endpoint or network monitoring tools to the customer network. Read More

Thumbnail Image

Join us at SecurIT: The Zero Trust Summit

June 13 in San Francisco. Get your complimentary pass today! Read More

White Paper: PTC

4 Reasons Remote Monitoring is Your Best Move to Better Service

Download this free e-book to discover how companies are realizing proven returns with IoT-enabled remote monitoring, which can be quickly implemented and monetized. Read More

CSO Insider

1. 8 hot cyber security trends (and 4 going cold)
2. 11 tips to prevent phishing
3. Sample computer and e-mail usage policy
4. State of Cybercrime: Security events decline, but not the impact
5. 6 use cases for blockchain in security

Editor's Picks

1. What’s new in Windows 10 security features: The privacy edition
2. 11 ways to hack 2FA
3. 7 highest-paying IT security jobs, 2018
4. A quick tour of the Dark Web
5. What an Apple phishing attack looks like
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.