US trade lobbying group attacked by suspected Chinese hackers

Email not displaying correctly? View it in your browser.

CIO

CIO Newswatch

Apr 07, 2017
Featured Image

Email security not keeping up with attacks

With clever cybercriminals finding creative new ways to get to users, has email security lost the battle to protect. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

US trade lobbying group attacked by suspected Chinese hackers
Chinese hackers go after third-party IT suppliers to steal data
Report: 30% of malware is zero-day, missed by legacy antivirus
How to securely deploy medical devices
Notorious iOS spyware has an Android sibling
Banking hackers left a clue that may link them to North Korea
What home products are most susceptible to cyber burglars?
Apache Struts 2 exploit used to install ransomware on servers
Antivirus headaches that compromise browser security
Windows 3.1: Twenty-five years later, it's still a Microsoft milestone
McAfee is once again an independent company
F-Secure buys Little Flocker to combat macOS ransomware
US says laptop ban may expand to more airports
Critical Xen hypervisor flaw endangers virtualized environments

White Paper: CA Technologies

Tech Tonics: It's All About the User Experience: CIO White Paper

Learn more about the benefits of delivering a flawless customer experience and the risk of poor performance. Read More

Thumbnail Image

US trade lobbying group attacked by suspected Chinese hackers

A group of what appears to be Chinese hackers infiltrated a U.S. trade-focused lobbying group as the two countries wrestle with how they treat imports of each other's goods and services. Read More

Thumbnail Image

Chinese hackers go after third-party IT suppliers to steal data

Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers. Read More

Thumbnail Image

Report: 30% of malware is zero-day, missed by legacy antivirus

At least 30 percent of malware today is new, zero-day malware that is missed by traditional antivirus defenses, according to a new report Read More

Thumbnail Image

How to securely deploy medical devices

Open Web Application Security Project (OWASP) has released a set of best practices for the secure deployment of those devices. Read More

Thumbnail Image

Notorious iOS spyware has an Android sibling

Security researchers have uncovered the Android version of an iOS spyware known as Pegasus in a case that shows how targeted electronic surveillance can be. Read More

Thumbnail Image

Banking hackers left a clue that may link them to North Korea

The notorious hackers behind a string of banking heists have left behind a clue that reveals a long-suspected link to North Korea, according to security researchers. Read More

Thumbnail Image

What home products are most susceptible to cyber burglars?

In the matter of the Dyn situation, it was those Internet of Things devices that created the voluminous distributed denial of sevice attack. A DVR was used to attack Dyn’s network. To reduce the impact of such attacks, officials at InsuranceQuotes have noted some of the more popular smart home gadgets in your home that could be vulnerable. Read More

Thumbnail Image

Apache Struts 2 exploit used to install ransomware on servers

Attackers are exploiting a vulnerability patched last month in the Apache Struts web development framework to install ransomware on servers. Read More

Thumbnail Image

Antivirus headaches that compromise browser security

Why web browsers leave security engineers constantly playing defense. Read More

Thumbnail Image

Windows 3.1: Twenty-five years later, it's still a Microsoft milestone

Microsoft launched Windows 3.1 on April 6, 1992. What made it so innovative 25 years ago? Let's take a stroll down memory lane in this slideshow. Read More

Thumbnail Image

McAfee is once again an independent company

Famed antivirus vendor McAfee is an independent company again as the sale of the majority of the firm to private equity firm TPG became final this morning. All current McAfee personnel, including research analysts, sales teams and support staff will remain in place, and products and pricing will also stay the same. Read More

Thumbnail Image

F-Secure buys Little Flocker to combat macOS ransomware

Endpoint security vendor F-Secure has acquired a behavior-based security application for macOS called Little Flocker that was developed by an independent researcher. Read More

Thumbnail Image

US says laptop ban may expand to more airports

The U.S. might add other airports to its ban restricting passengers from bringing laptops on board certain flights from the Middle East. Read More

Thumbnail Image

Critical Xen hypervisor flaw endangers virtualized environments

A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a guest operating system running inside a virtual machine and access the host system's entire memory. Read More

White Paper: CA Technologies

E.P.I.C. APM: Toward a Better APM Model for the Application Economy: CIO White Paper

This whitepaper examines the Application Economy and the challenges it presents to monitoring application performance. It also introduces CA Technologies' E.P.I.C. strategy to make APM Easy, Proactive, Intelligent and Collaborative. Read More

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Newswatch as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.