The history of ransomware

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Jul 20, 2016
Featured Image

Hackers are targeting the Rio Olympics, so watch out for these cyberthreats

The Olympics in Rio de Janeiro will attract more than just athletes and tourists this year -- hackers from across the world will also be on the prowl, trying to exploit the international event. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The history of ransomware
15% off Google OnHub AC1900 Wireless Wi-Fi Router - Deal Alert
Security newbs find training program that pays
An opportunity for leaders to improve security by helping others

White Paper: AT&T / AT&T Wireless

Breaking the Constraints of Wide Area Networking

A recent IDG Research survey shows enterprises are eager to modernize their networks but are constrained by financial considerations and the fear of getting locked into proprietary solutions. Relief is in view with the advent of software defined WAN that further supports the evolution of the agile enterprise. Read More

Thumbnail Image

The history of ransomware

See more than 20 variants of these attacks through the years. Read More

Thumbnail Image

15% off Google OnHub AC1900 Wireless Wi-Fi Router - Deal Alert

OnHub provides Wi-Fi speeds up to 1900 mbps to help with smooth streaming, gaming, and downloading. Its unique design and 13 antennas provide reliable speed in every direction, covering up to 2,500 square feet. And OnHub can connect 100+ devices at the same time. Read More

Thumbnail Image

Security newbs find training program that pays

Graduates of OptivU training program share their experiences Read More

Thumbnail Image

An opportunity for leaders to improve security by helping others

A discussion with Bryan Hjelm about some recent findings revealed an opportunity for security leaders to elevate others to improve security for everyone Read More

White Paper: KPMG

The Challenge of Governing Your Information

Organizations must address how best to allocate scarce resources to protect and govern information. This question encapsulates the evolving dilemma of information governance. How should an organization protect and govern its information assets when the rate of data growth is estimated to be nearly 50 percent year-over-year? These growth rates present tremendous cost pressures. Read More

Top 5 Stories

1. Experts say Pokémon Go exposes players to security and privacy risks
2. Vicious new ransomware takes your money and still deletes your files
3. Apple devices held for ransom, rumors claim 40M iCloud accounts hacked
4. Killing the password: FIDO says long journey will be worth it
5. Market expansion adds to cybersecurity talent

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.