CSO50 2017: 50 forward-thinking security projects

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Feb 10, 2017
Featured Image

'Fileless malware' attacks, used on banks, have been around for years

Fileless malware attacks, which were recently discovered in the networks of at least 140 banks, telecoms and governments, account for about 15% of known attacks today and have been around for years. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

CSO50 2017: 50 forward-thinking security projects
38% Apple USB-C Digital AV Multiport Adapter - Deal Alert
Counterterrorism analyst explains the dark web
Apple's iCloud saved deleted browser records, security company finds
Windows Trojan hacks into embedded devices to install Mirai
Hospital devices left vulnerable, leave patients at risk
Android privacy assistant seeks to stop unwanted data collection

Video/Webcast: Neustar Inc

Best Practices in Managing Digital Media Rights for the Connected World

The average adult in the U.S. consumes more than 10 hours of digital media daily and nearly two-thirds is on mobile devices. Content providers must understand the requirements that impact how consumer's access and view digital media. It changes constantly. Join live Thursday, March 09, 2017, 01:00 PM EST. Read More

Thumbnail Image
INSIDER

CSO50 2017: 50 forward-thinking security projects

The annual CSO50 conference in May will showcase cutting-edge technologies. Read More

Thumbnail Image
DealPost

38% Apple USB-C Digital AV Multiport Adapter - Deal Alert

Connect your MacBook with USB-C port to an HDMI display, while also connecting a standard USB device and a USB-C charging cable. Read More

Thumbnail Image

Counterterrorism analyst explains the dark web

Tips for the security news hoping to someday develop an intimate understanding of terrrorists and criminals Read More

Thumbnail Image

Apple's iCloud saved deleted browser records, security company finds

Apple’s iCloud appears to have been holding on to users’ deleted internet browsing histories, including records over a year old. Read More

Thumbnail Image

Windows Trojan hacks into embedded devices to install Mirai

Attackers have started to use Windows and Android malware to hack into embedded devices, dispelling the widely held belief that if such devices are not directly exposed to the Internet they're less vulnerable. Read More

Thumbnail Image

Hospital devices left vulnerable, leave patients at risk

A patient lies in a hospital bed waiting for a medical professional to conduct a blood gas analysis. Little does the patient know that his personal information is also undergoing a procedure. The database that stores patient data was found unencrypted, default passwords were used, and the nature of the exploit was basic. Read More

Thumbnail Image

Android privacy assistant seeks to stop unwanted data collection

Not sure what your phone is collecting about you? A new Android app is promising to simplify the privacy settings on your smartphone, and stop any unwanted data collection. Read More

White Paper: IBM Corporation

Big Data, Bad Data, Good Data: The Link Between Information Governance and Big Data Outcomes

Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. It's no wonder, then, that big data initiatives are a top investment area today and a strategic priority for forward-thinking organizations in every industry. Read More

Top 5 Stories

1. 29,000 taxpayers affected by W-2 scams, IRS issues new warning
2. The security theory and troubling practice behind the TSA's Pre-check security lines
3. Malware distributors are switching to less suspicious file types
4. Can you spot the phish?
5. How AI is stopping criminal hacking in real time

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.