CSO

CSO Daily

November 22, 2019

Image: Emergent Android banking Trojan shows app overlay attacks are still effective

Emergent Android banking Trojan shows app overlay attacks are still effective

By taking code from another Android Trojan, Anubis, the Ginp malware has enhanced itself and has begun targeting banks. Read more ▶

Your Must-Read Stories

•

How to build a Windows disaster recovery toolkit

•

Best new Windows 10 security features: Longer support, easier deployment

•

How a bank got hacked (a study in how not to secure your networks)

•

10 ways to kill your security career

•

How to secure your router and home network

•

Back to basics: How phishing works and how to prevent it

White Paper: Belatrix Software Factory

Belatrix and Kernel Collaborate to Bring Real-Time Insights to Pharma

The biopharmaceutical (pharma) industry is undergoing major transformation. Read more ▶

Image: How to build a Windows disaster recovery toolkit

How to build a Windows disaster recovery toolkit

Sooner or later, a security incident will shut down or disrupt your network. You'll be better prepared with these items in your disaster recovery toolkit. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: Best new Windows 10 security features: Longer support, easier deployment

Best new Windows 10 security features: Longer support, easier deployment

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1909 feature release. Read more ▶

 
 
Image: How a bank got hacked (a study in how not to secure your networks)

How a bank got hacked (a study in how not to secure your networks)

Notorious hacker Phineas Phisher claims to have netted hundreds of thousands of pounds sterling in a 2016 hack of the Cayman National Isle of Man Bank. Here's how he did it and why it's cause for concern. Read more ▶

Image: 10 ways to kill your security career

10 ways to kill your security career

A breach won’t necessarily doom your career, but these missteps could hamper your professional ambitions. Read more ▶

Image: How to secure your router and home network

How to secure your router and home network

Many users don't realize it, but their internet router is the most important electronic device in their home and is an attractive target for attackers. Read more ▶

Image: Back to basics: How phishing works and how to prevent it

Back to basics: How phishing works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack. Read more ▶

Case Study: PerimeterX

Case Study "Avenue Stores"

Account takeover attacks are on the rise and result in billions of losses annually. Check out this case study to learn how Avenue Stores detected and addressed ATO attacks on Avenue.com. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.