Your Linux-based home router could succumb to a new Telnet worm, Remaiten

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Apr 01, 2016
Featured Image

FBI is cracking an iPhone in an Arkansas murder case

The FBI is helping Arkansas prosecutors break into an iPhone and iPad looking for evidence in a murder trial, and it’s without asking Apple for help. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Your Linux-based home router could succumb to a new Telnet worm, Remaiten
Is the blockchain good for security?
At the intersection of energy risk management and facility security
For some, working in security comes naturally
Feds tackle open source code quality
Hackers can abuse the iOS mobile device management protocol to deliver malware

White Paper: CommVault

5 Benefits of Disaster Recovery in the Cloud

This paper explores why the cloud is well suited for disaster recovery and what organizations need to consider to ensure that cloud DR is right for them. Read More

Thumbnail Image

Your Linux-based home router could succumb to a new Telnet worm, Remaiten

A new worm called Remaiten infects Linux-based embedded systems by exploiting weak Telnet passwords. Read More

Thumbnail Image

Is the blockchain good for security?

The blockchain is now being hyped as the solution to all inefficient information processing systems, such as recording of property transfers, escrow services, and even legal contracts, but there are both security benefits and challenges to the technology Read More

Thumbnail Image

At the intersection of energy risk management and facility security

Security professionals in the utility sector must understand the distinct difference between risks, threats, and vulnerabilities and how they all provide useful data points for an effective risk management program. The outputs of this data should be used to create a responsive physical security plan. Read More

Thumbnail Image

For some, working in security comes naturally

This week's LifeJourney mentor, Delali Dzirasa, President, Fearless talks about the natural progression of his career path Read More

Thumbnail Image

Feds tackle open source code quality

Even as the White House is calling on federal agencies to make more use of open source projects, there's also a federal effort under way to reduce the number of vulnerabilities in those products via better code review tools and bug bounties Read More

Thumbnail Image

Hackers can abuse the iOS mobile device management protocol to deliver malware

Researchers from Check Point Software Technologies found that the communication between MDM products and iOS devices is susceptible to man-in-the-middle attacks and can be hijacked to install malware on non-jailbroken devices. Read More

White Paper: CommVault

5 Steps to Migrate Your Applications to the Cloud Stress Free

This paper examines five easy ways to overcome concerns about managing increased data flows, and moving operations to the cloud and offers solutions to each concern. Read More

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.