Hackers, hackers everywhere in Ljubljana

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Mar 10, 2016
Featured Image

Experts say 'chip off' procedure to access terrorist's iPhone is risky

The iPhone 5c at the center of the legal battle between Apple and the FBI might be accessible through a delicate hardware technique, but experts warn it would be difficult. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Hackers, hackers everywhere in Ljubljana
Locky ransomware activity ticks up
Microsoft patches remote code execution flaws in Windows, IE, Edge, Office
Mac ransomware KeRanger has flaws that could let users recover files

White Paper: QuickBase

Creating an Ecosystem of Connected Apps

Low-code rapid app development platforms are helping organizations to create agile ecosystems of connected apps with no code required. Learn how these platforms allows you to connect apps with other cloud or on-premise apps. Read More

Thumbnail Image

Hackers, hackers everywhere in Ljubljana

Read More

Thumbnail Image

Locky ransomware activity ticks up

Locky, a new family of ransomware that emerged in the last few weeks, has quickly made a mark for itself. Read More

Thumbnail Image

Microsoft patches remote code execution flaws in Windows, IE, Edge, Office

Microsoft has fixed 39 vulnerabilities in multiple Windows components, Internet Explorer, Edge, Office and .NET Framework, many of which allow for remote code execution. Read More

Thumbnail Image

Mac ransomware KeRanger has flaws that could let users recover files

The KeRanger file-encrypting ransomware program for Mac OS X is based on Linux.Encoder and contains crypto flaws that could allow users to recover their files without paying cybercriminals. Read More

Video/Webcast: QuickBase

Cut Your IT Backlog by 50% in Minutes

In the past 18 months, IT backlogs have risen 29%, and they are slowing down businesses that need to move more quickly. Learn how you can reduce your IT backlog by 50% in just 30 minutes, while creating a sustainable approach for the future. Read More

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.