Vox Media EIC hacked, Twitter feed promoting questionable security service

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jul 05, 2016
Featured Image

Big Brother is listening as well as watching

The professed goal of audio surveillance on mass transit systems may be to protect passengers. But privacy advocates say it crosses a line, amounting to violations of free speech and the right to be free from unwarranted and ‘unreasonable’ searches. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Vox Media EIC hacked, Twitter feed promoting questionable security service
Web security guru: Focus on ransomware, SDLC, and endpoints
Hackers are coming for your healthcare records -- here’s why

White Paper: Progress Software

5 Reasons to Adopt Business Rules

Learn 5 simple reasons you need business rules to help speed up workflows, bring new products to market and better serve your customers. Read More

Thumbnail Image

Vox Media EIC hacked, Twitter feed promoting questionable security service

On Saturday, Ezra Klein, the Editor-in-Chief (EIC) of Vox.com had his Twitter feed turned into a promotional tool for services provided by OurMine. In recent weeks, the group has taken credit for several social media hacks, with victims that include Silicon Valley and Hollywood elites. Read More

Thumbnail Image

Web security guru: Focus on ransomware, SDLC, and endpoints

The noted web security guru worries that the key web and application threats aren't getting the right level of focus Read More

Thumbnail Image

Hackers are coming for your healthcare records -- here’s why

Because patient information can be so lucrative, healthcare organizations and insurance companies are being targeted by hackers and should expect to eventually suffer a security breach. Read More

White Paper: Progress Software

Achieving Business Agility

Fundamental to business agility is the ability to make the right business decisions at the right time. Of course, data drives decisions-therefore, business agility actually starts with corporate IT and extends throughout the enterprise. Read More

Top 5 Stories

1. Dangerous keyboard app has more than 50 million downloads
2. This malware pretends to be WhatsApp, Uber and Google Play
3. 11 ways to fight off ransomware
4. Account security: moving past the password
5. Hard Rock Las Vegas suffers a second data breach

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.