US wants 5 years' worth of social media history from visa applications

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Apr 02, 2018
Featured Image

Don’t rush to deploy 5G if you want IoT security, agency warns

Flaws in 2G, 3G and 4G networks could be repeated in 5G, says EU IT security agency. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

US wants 5 years' worth of social media history from visa applications
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
Iran's need to steal intellectual property
Want to hack a voting machine? Hack the voting machine vendor first
1.4B stolen passwords are free for the taking: What we know now
11 ways ransomware is evolving

eBook: Citrix Systems Inc

Enabling the Distributed Enterprise with SD-WAN Customer Stories

Discover how Citrix customers are redefining their distributed Enterprise networks with NetScaler SD-WAN. Read More

Thumbnail Image

US wants 5 years' worth of social media history from visa applications

Extreme vetting may get even more extreme as 14.7 million people annually would be effected by the new proposal. Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

Iran's need to steal intellectual property

The indictment of nine Iranians by the DOJ is one in a long string of incursions by Iran to compromise trusted insiders and steal intellectual property. Read More

Thumbnail Image

Want to hack a voting machine? Hack the voting machine vendor first

How password reuse and third-party breaches leave voting machine vendors vulnerable to attack. Read More

Thumbnail Image
INSIDER

1.4B stolen passwords are free for the taking: What we know now

The 2012 LinkedIn breach, along with other old third-party breaches, is still paying dividends for criminals, who now have free access to 1.4 billion previously exposed email addresses and passwords. Read More

Thumbnail Image

11 ways ransomware is evolving

Ransomware creators are getting more sophisticated in how they infect systems, avoid detection, and foil decryption efforts. Read More

Case Study: Spectrum Enterprise

Fibers Scalability Keeps Data Flowing Fast as MMC Corp Adds Offices and Job Sites Nationwide

Partnering with Spectrum Enterprise provides scalability to upgrade bandwidth rapidly, connect new offices, and add or remove work sites. With an affordable price point for giving multiple locations the bandwidth to exchange large files quickly. Read More

CSO Insider

1. 14 top tools to assess, implement, and maintain GDPR compliance
2. What are the GDPR requirements?
3. Third-party security vetting: Do it before you sign a contract
4. Separation of duties and IT security
5. Review: Bricata adds threat hunting to traditional IPS/IDS

Editor's Picks

1. Rogues' gallery: 7 insiders who breached security
2. Why you don't need an RFID-blocking wallet
3. The 6 best password managers
4. 8 hot cyber security trends (and 4 going cold)
5. The 10 Windows group policy settings you need to get right
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.