Thousands of kids’ Apple IDs stored in plaintext on unprotected server

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

May 22, 2018
Featured Image

Cybercriminals impersonate popular file sharing services to take over email accounts

Email account takeover attacks are growing, and attackers are impersonating OneDrive and other popular web services to steal credentials from employees. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Thousands of kids’ Apple IDs stored in plaintext on unprotected server
$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert
Microsoft locks down Windows 10 with the S edition
Voice squatting attacks: Hacks turn Amazon Alexa, Google Home into secret eavesdroppers
What is Telegram and is it secure?
The 5 best malware metrics you can generate

White Paper: Freudenberg IT LP (FIT)

How to Block Security Breaches at the Endpoint

Even though most organizations understand the need to protect the enterprise against malware, it's clear not all technology can do the job. But there's good news: organizations can partner with a managed service provider (MSP) to provide missing expertise and oversight, and ensure they have the right security tools in place. Read More

Thumbnail Image

Thousands of kids’ Apple IDs stored in plaintext on unprotected server

Researcher discovered TeenSafe stored thousands of kids’ Apple IDs in plaintext on an unprotected AWS server. The server has since been taken down. Read More

Thumbnail Image
DealPost

$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More

Thumbnail Image

Microsoft locks down Windows 10 with the S edition

New security features and limits on what you can load and customize promise to make Microsoft Windows 10 S the more secure version ever. It might not be for everyone, though. Read More

Thumbnail Image

Voice squatting attacks: Hacks turn Amazon Alexa, Google Home into secret eavesdroppers

Researchers devise new two new attacks -- voice squatting and voice masquerading -- on Amazon Alexa and Google Home, allowing adversaries to steal personal information or silently eavesdrop. Read More

Thumbnail Image

What is Telegram and is it secure?

The Telegram messaging app has grown in popularity since its launch in 2013, but not without controversy. Read More

Thumbnail Image
INSIDER

The 5 best malware metrics you can generate

Are you asking the right computer security questions? If you can answer these five, you'll know better how to secure your organization. Read More

White Paper: Palo Alto Networks

10 Things Your Next Firewall Must Do

As the leader and pioneer of the next-generation firewall category, Palo Alto Networks would like to share what we have learned from securing over 3,500 enterprise networks in the past few years. Download our guide that depicts the top 10 requirements you should demand in your next firewall purchase. Read More

CSO Insider

1. 8 hot cyber security trends (and 4 going cold)
2. 11 tips to prevent phishing
3. Sample computer and e-mail usage policy
4. State of Cybercrime: Security events decline, but not the impact
5. 6 use cases for blockchain in security

Editor's Picks

1. What’s new in Windows 10 security features: The privacy edition
2. 11 ways to hack 2FA
3. 7 highest-paying IT security jobs, 2018
4. A quick tour of the Dark Web
5. What an Apple phishing attack looks like
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.