June 2016: The month in hacks and breaches

Email not displaying correctly? View it in your browser.

CSO

CSO Newswatch

Jul 01, 2016
Featured Image

Are hospital security standards putting patient safety at risk?

Ted Harrington from Independent Security Evaluators joins CSO to discuss how hospitals are more vulnerable in protecting patient health than patient data. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

June 2016: The month in hacks and breaches
Kaspersky: Ransomware that encrypts is booming
Time is short to stop expansion of FBI hacking, senator says
Identify the “who” in risk mitigation
ACLU lawsuit challenges US computer hacking law
Over 100 DDoS botnets built using Linux malware for embedded devices

White Paper: IBM Corporation

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)

Essential capabilities for secure mobility. In this white paper we will look at NIST and DISA efforts to articulate requirements for Mobile Device Management. Read More

Thumbnail Image
INSIDER

June 2016: The month in hacks and breaches

Here's how the summer is heating up for hackers. Read More

Thumbnail Image

Kaspersky: Ransomware that encrypts is booming

Over the past year the number of machines hit by ransomware that encrypts all or part of the hard drive is five-and-a-half times what it was the year before, according to Kaspersky Lab. Read More

Thumbnail Image

Time is short to stop expansion of FBI hacking, senator says

The U.S. Congress has a small window of time to stop proposed changes in federal court rules that will expand the FBI's authority to hack into computers during criminal investigations, a senator said Thursday. Read More

Thumbnail Image

Identify the “who” in risk mitigation

Risk management strategies are designed for organizations seeking to improve their resilience in the face of a dynamic and ever-changing threat landscape. Knowing the “whos” will greatly assist organizations in developing unique strategies that fit their risk management needs, by forcing them to look beyond themselves and at those stakeholders that may have gone unnoticed. In the end, risk management is many-faced, and a good strategy will represent all of those interests. Read More

Thumbnail Image

ACLU lawsuit challenges US computer hacking law

The American Civil Liberties Union has filed a lawsuit challenging a 30-year-old hacking crimes law, with the civil liberties group saying the law inhibits research about online discrimination. Read More

Thumbnail Image

Over 100 DDoS botnets built using Linux malware for embedded devices

LizardStresser, the DDoS malware for Linux systems written by the infamous Lizard Squad attacker group, was used over the past year to create over 100 botnets, some built almost exclusively from compromised internet-of-things devices. Read More

Video/Webcast: KnowBe4

Are You Protected Against the Weakest Link in Network Security?

The bad guys are just one gullible user click away from staging an all-out invasion. Watch this 2-minute video and learn how you can keep your users on their toes with security top of mind. Read More

Top 5 Stories

1. Researchers steal data from a PC by controllng the noise from the fans
2. 11 ways to fight off ransomware
3. Broken Phishing scam targets several tech journalists
4. The quickest way to annoy a privacy pro
5. Hard Rock Las Vegas suffers a second data breach

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Newswatch as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.