Attack campaign uses keylogger to hijack key business email accounts

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Mar 21, 2016
INSIDER

CSO Threat Intelligence Survival Guide

If enterprises want to understand how they can better invest in security defenses, build the necessary processes to respond to attacks, and mitigate the risks of a breach they need to get threat intelligence right. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Attack campaign uses keylogger to hijack key business email accounts
FTC warns app developers against using audio monitoring software
Vehicles 'increasingly vulnerable' to hacking, FBI warns
New Stagefright exploit puts millions of Android devices at risk
Security Sessions: Tips for building a security team

Video/Webcast: Check Point Software Technologies Ltd.

A New Model for Security Management

Join us live April 5th @11:00 AM EDT for this webcast to understand the trends that are disrupting the way security is managed today. Read More

Thumbnail Image

Attack campaign uses keylogger to hijack key business email accounts

A new email-based attack campaign is targeting key employees from companies in the US, Middle East and Asia with the goal of compromising their computers and email accounts. Read More

Thumbnail Image

FTC warns app developers against using audio monitoring software

The U.S. Federal Trade Commission has sent warning letters to 12 smartphone app developers for allegedly compromising users' privacy by packaging audio monitoring software into their products. Read More

Thumbnail Image

Vehicles 'increasingly vulnerable' to hacking, FBI warns

The FBI and the National Highway Traffic Safety Administration warned on Thursday that the rising use of computers in vehicles poses increasing risks of cyberattacks. Read More

Thumbnail Image

New Stagefright exploit puts millions of Android devices at risk

Millions of Android devices are at risk yet again after researchers found a new way to exploit an older vulnerability that was previously patched by Google. Read More

Thumbnail Image
Video

Security Sessions: Tips for building a security team

You're asked to build (or rebuild) a security team at your organization. What are some first steps and tips to keep in mind to maximize talent and efficiency in your new department? Josh Feinblum, VP of Information Security at Rapid7 has some advice. Watch Now

Video/Webcast: Armor

Armor & Slide Network Inc. Video Case Study | The Gift of Trust

How did this gift card app startup leverage an active cyber defense solution and PCI-compliant platform to win the trust of retailers, customers and investors? In this video, we hear why their relationship with Armor is so critical to their success. Read More

10 tips for CIOs looking for a seat on the board

Here’s how IT leaders from Procter & Gamble, Biogen and Google Ventures secured their seats. Learn more

The dirty dozen: 12 cloud security threats

These are the top security threats organizations face when using cloud services. Meet the 'Treacherous 12

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.