5 shocking new threats to your personal data

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Feb 10, 2017
Featured Image

At Dulles, a security awareness success story

The detention of Norway’s former prime minister, when stripped of politics, was an example of proper security awareness. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

5 shocking new threats to your personal data
January 2017: The month in hacks and breaches
Data realities of 2017 and beyond
What company execs can learn from Trump’s tweeting
Report: IRS-related phishing scams seen running rampant
Online card fraud up as thieves avoid more secure chip cards for in-store payments
The security theory and troubling practice behind the TSA's PreCheck security lines
TV maker Vizio pays $2.2M to settle complaint that it spied on users
Mac malware, possibly made in Iran, targets U.S. defense industry
7 musts for any successful BYOD program
Ransomware soars in 2016, while malware declines

Video/Webcast: SAS/Cloudera

Reducing Fraud in Financial Services

Fighting fraud and financial crime effectively in today's connected world means converging tools and data into a scalable, flexible, and secure platform without costing more than the problem you're trying to solve. Join SAS, Cloudera, and Intel as they join forces to present one such platform, which leverages Big Data and Advanced Analytics to predict and prevent fraud and financial crimes. Read More

Thumbnail Image

5 shocking new threats to your personal data

The internet and smartphones have come up with five new and surprising ways to steal or expose our personal data. These trends make panic sound like a good idea. Read More

Thumbnail Image
INSIDER

January 2017: The month in hacks and breaches

Hackers are off to a quick start in the new year. Read More

Thumbnail Image

Data realities of 2017 and beyond

There’s no escaping the facts anymore: Data rules everything now. Are IT leaders prepared to deal with that? Read More

Thumbnail Image

What company execs can learn from Trump’s tweeting

Being judicious about social media use and staying away from Wi-Fi protects executives and the enterprise. Read More

Thumbnail Image

Report: IRS-related phishing scams seen running rampant

IRS phishing scams are likely underway on a grand scale, according to a PhishLabs report. Read More

Thumbnail Image

Online card fraud up as thieves avoid more secure chip cards for in-store payments

Deterred by more secure chip cards for in-store payments, thieves have resorted to stealing credit-card numbers and passwords or opening new accounts with false credentials to use in making online payments for purchases, according to recent studies. Read More

Thumbnail Image

The security theory and troubling practice behind the TSA's PreCheck security lines

What is up with the TSA PreCheck program? Aside from being convenient, how does one get that pass through the security checkpoint? And how do you prove you are not a threat? Read More

Thumbnail Image

TV maker Vizio pays $2.2M to settle complaint that it spied on users

Popular smart TV maker Vizio will pay $2.2 million to settle complaints that it violated customers' privacy by continuously monitoring their viewing habits without their knowledge. Read More

Thumbnail Image

Mac malware, possibly made in Iran, targets U.S. defense industry

Just because you’re using a Mac doesn’t mean you’re safe from hackers. That’s what two security researchers are warning, after finding a Mac-based malware that may be an attempt by Iranian actors to target the U.S. defense industry. Read More

Thumbnail Image

7 musts for any successful BYOD program

Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere. Read More

Thumbnail Image

Ransomware soars in 2016, while malware declines

A global cyberthreat report found that 2016 was a mixed bag: malware was down slightly, but ransomware attacks soared, up 167 times the number recorded in 2015. Read More

White Paper: Level 3

Network Security Playbook Guide

You've seen the headlines: cyber breaches at major corporations jeopardizing confidential information for millions of users; highly targeted spear phishing campaigns delivering malware deep into networks; and DDoS attacks at e-Commerce companies causing loss of revenue and brand damage. Read More

CIO Insider

1. 7 agile certifications to take your career to the next level
2. What's next for Azure Site Recovery?
3. What IT security pros are earning in 2017
4. How to prevent a bad case of cloud buyer’s remorse
5. 4 reasons Microsoft Teams will kill Slack… and 4 reasons it won’t

Editor's Picks

1. 15 data and analytics trends that will dominate 2017
2. How to track employee well-being as a KPI
3. 7 leadership traits of successful CIOs
4. Samsung Galaxy S8: What we know so far
5. Lessons from the rise and fall of an open source project
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.