Here are the 61 passwords that powered the Mirai IoT botnet

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Oct 04, 2016
Featured Image

Five tips for protecting your brand on social media

This summer, online payment service giant Paypal learned that bad guys had set up a fake Paypal Support page on Twitter, and then monitored the real Paypal Support page for remarks from customers. The bad guys responded to those inquiries and pointed users to the fake site where they would ask for, and sometimes receive, personal and account information – an attack called angler phishing. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Here are the 61 passwords that powered the Mirai IoT botnet
27% off AUKEY SoundTank Bluetooth Water Resistant Speaker with 30-Hour Playtime - DealPost
A first: ICANN will generate new DNSSec key
Man in the middle attacks on mobile apps
Data leaks evolving into weapons of business destruction
Attracting female talent: How to tackle the cybersecurity gender gap head on
ICYMI: 6 expert tips to better secure third-party network access

White Paper: ITS Partners

2016 Security Predictions

The ITS Security Team presents eight key predictions on what it will take to keep good stuff in and keep bad stuff out in 2016. Read More

Thumbnail Image

Here are the 61 passwords that powered the Mirai IoT botnet

Default usernames and passwords have always been a massive problem in IT. These days, consumer technology that envelops the Internet of Things (IoT) has made the problem larger. Default credentials, which are ignored or too difficult for some people to change, are to blame for the development of a botnet that took part in the largest DDoS attack on record. Read More

Thumbnail Image
DealPost

27% off AUKEY SoundTank Bluetooth Water Resistant Speaker with 30-Hour Playtime - DealPost

Weighing in at just over a pound, the AUKEY SK-M12 is the ideal lightweight, water resistant companion speaker. Dual 5 watt speaker drivers powered by a 2600mAh rechargeable battery deliver up to 30 continuous hours of wireless sound. Read More

Thumbnail Image

A first: ICANN will generate new DNSSec key

The update is a serious and critical undertaking that will ensure greater DNS security Read More

Thumbnail Image

Man in the middle attacks on mobile apps

Man in the middle attacks (MiTM) are a popular method for hackers to get between a sender and a receiver. MiTM attacks, which are a form of session hijacking are not new. However, what might not be known is that mobile devices are vulnerable to MiTM attacks too. In particular, mobile apps are vulnerable to MiTM attacks. Read More

Thumbnail Image

Data leaks evolving into weapons of business destruction

Increasingly, attackers are using data leaks to target the companies themselves, going after proprietary or embarrassing information and releasing it in such a way as to do the most harm. Read More

Thumbnail Image

Attracting female talent: How to tackle the cybersecurity gender gap head on

Read More

Thumbnail Image

ICYMI: 6 expert tips to better secure third-party network access

Survey shows that enterprises are not worrying enough about outside access to their networks. Read More

White Paper: VMware

5 Important Buying Criteria to Enable a Totally Mobile Workforce

This paper provides guidance for selecting and purchasing a virtual work space solution to enable your totally mobile workforce. Five buying decision considerations that directly impact the success of your mobile work space strategy are discussed in detail. Recommendations for the most critical specifications are given to help you in defining an effective virtual work space strategy for your environment. Read More

Top 5 Stories

1. Pokémon Go's strategy could thwart cybersecurity threats
2. These ransomware tricks fool the most hardened security pro
3. Security myths that can make you laugh… or cry
4. Meet Apache Spot, a new open source project for cybersecurity
5. Why your employees are still a huge security risk

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.