Leaky IoT devices help hackers attack e-commerce sites

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Oct 12, 2016
Featured Image

Amazon resets customer passwords, while LeakedSource discloses massive update

Last weekend, and continuing on to earlier this week, Amazon sent password reset notifications to customers whose accounts were likely using recycled credentials. In somewhat related news, LeakedSource said on Tuesday they’ve added nearly 40 million hacked accounts to their database. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Leaky IoT devices help hackers attack e-commerce sites
27% off SanDisk Connect Wireless Stick 200GB - Deal Alert
What have we learned from the Yahoo breach?
Second group of hackers found also targeting SWIFT users
The internet of insecure things: Thousands of internet-connected devices are a security disaster in the making

White Paper: Hedvig, Inc.

2016 Predictions For Cloud & What I&O Pros Should Do About Them

This report by Forrester outlines 11 factors that will accelerate cloud adoption in 2016. Read More

Thumbnail Image

Leaky IoT devices help hackers attack e-commerce sites

Millions of IoT devices are misconfigured so that they can forward messages -- which, combined with default admin settings, allows them to be used to attack e-commerce and other websites, a new report says Read More

Thumbnail Image
DealPost

27% off SanDisk Connect Wireless Stick 200GB - Deal Alert

A flash drive, reinvented. With the SanDisk Connect Stick in your pocket, in your bag or across the room, you can wirelessly access your media or transfer large files, stream HD videos and music, and save and share photos and videos to and from your mobile device. Read More

Thumbnail Image

What have we learned from the Yahoo breach?

The progressive organization represents the highest level of cybersecurity maturity and these organizations share several key qualities that help them to rise to the top when it comes to being prepared in today’s cybersecurity threat landscape. Read More

Thumbnail Image

Second group of hackers found also targeting SWIFT users

A second hacking group is also trying to rob banks by exploiting the SWIFT money transfer system, following an $81 million heist in February that used a similar approach. Read More

Thumbnail Image

The internet of insecure things: Thousands of internet-connected devices are a security disaster in the making

We talked to a host of tech experts about the state of security in the IoT world, and found out the good, the bad, and the very ugly. Read More

White Paper: Insight

7 Key Hybrid Cloud Practices for Enterprises

Gain the best of both worlds through combining the immediate availability and elastic scalability of the public cloud with the security, compliance and control available in on-premise, highly automated infrastructure. Read More

Top 5 Stories

1. Metadata wrecks Guccifer 2.0's claims of a Clinton Foundation hack
2. Here are the 61 passwords that powered the Mirai IoT botnet
3. WikiLeaks dumps another trove of email, allegedly from Clinton aide
4. Time to kill security awareness training
5. Not so startling revelations of how a hacker broke in

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.