June 2016: The month in hacks and breaches

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jul 01, 2016
Featured Image

Are hospital security standards putting patient safety at risk?

Ted Harrington from Independent Security Evaluators joins CSO to discuss how hospitals are more vulnerable in protecting patient health than patient data. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

June 2016: The month in hacks and breaches
Over 100 DDoS botnets built using Linux malware for embedded devices
Time is short to stop expansion of FBI hacking, senator says
Kaspersky: Ransomware that encrypts is booming

White Paper: IBM Corporation

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)

Essential capabilities for secure mobility. In this white paper we will look at NIST and DISA efforts to articulate requirements for Mobile Device Management. Read More

Thumbnail Image
INSIDER

June 2016: The month in hacks and breaches

Here's how the summer is heating up for hackers. Read More

Thumbnail Image

Over 100 DDoS botnets built using Linux malware for embedded devices

LizardStresser, the DDoS malware for Linux systems written by the infamous Lizard Squad attacker group, was used over the past year to create over 100 botnets, some built almost exclusively from compromised internet-of-things devices. Read More

Thumbnail Image

Time is short to stop expansion of FBI hacking, senator says

The U.S. Congress has a small window of time to stop proposed changes in federal court rules that will expand the FBI's authority to hack into computers during criminal investigations, a senator said Thursday. Read More

Thumbnail Image

Kaspersky: Ransomware that encrypts is booming

Over the past year the number of machines hit by ransomware that encrypts all or part of the hard drive is five-and-a-half times what it was the year before, according to Kaspersky Lab. Read More

Video/Webcast: KnowBe4

Are You Protected Against the Weakest Link in Network Security?

The bad guys are just one gullible user click away from staging an all-out invasion. Watch this 2-minute video and learn how you can keep your users on their toes with security top of mind. Read More

Top 5 Stories

1. Researchers steal data from a PC by controllng the noise from the fans
2. 11 ways to fight off ransomware
3. Broken Phishing scam targets several tech journalists
4. The quickest way to annoy a privacy pro
5. Hard Rock Las Vegas suffers a second data breach

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.