IoT botnet bogs down college campus network

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Feb 15, 2017
Featured Image

Hot products at RSA 2017

RSA, the world’s largest security conference, is underway this week in San Francisco with attendees from around the world gathering to hear the latest strategies for fighting cyberattacks. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

IoT botnet bogs down college campus network
47% off Earth Pak Waterproof Dry Bag Compression Sack And Phone Case - Deal Alert
Researcher develops ransomware attack that targets water supply
Biometric tracking in the enterprise
Microsoft shelves all February security updates
At RSA, doubts abound over US action on cybersecurity
To pay or not to pay: Too many victims say yes to ransomware

White Paper: Cisco Systems

10 Networking Priorities for Digital Transformation

Digital transformation isn't a technology or a product. Rather, it's a philosophy for using digital assets to change the way an organization runs. It involves realigning technology and modifying business processes to better engage employees, customers and other constituents of the extended enterprise. Read More

Thumbnail Image

IoT botnet bogs down college campus network

Senior members of the unnamed university’s help desk had been receiving an increasing number of complaints from students across campus about slow or inaccessible network connectivity. With Verizon's help, they tracked down the botnet attacking the network. Read More

Thumbnail Image
DealPost

47% off Earth Pak Waterproof Dry Bag Compression Sack And Phone Case - Deal Alert

While Kayaking, Beaching, Rafting, Boating, Hiking, Camping or Fishing, this super durable and waterproof bag keeps your phone, electronics and gear safe. Read More

Thumbnail Image

Researcher develops ransomware attack that targets water supply

A security researcher is showing that it’s not hard to hold industrial control systems for ransom. He's experimented with a simulated water treatment system based on actual programmable logic controllers (PLCs) and documented how these can be hacked. Read More

Thumbnail Image

Biometric tracking in the enterprise

Tracking employees via biometric badges is a growing trend in the enterprise but there are still major concerns around consent and how that data is being used for the good of the business Read More

Thumbnail Image

Microsoft shelves all February security updates

Microsoft today took the unprecedented step of postponing an entire month's slate of security updates for Windows and its other products. Read More

Thumbnail Image

At RSA, doubts abound over US action on cybersecurity

How should the U.S. respond to cyber attacks? That’s been a major question at this year’s RSA security conference, following Russia’s suspected attempt to influence last year’s election. Read More

Thumbnail Image

To pay or not to pay: Too many victims say yes to ransomware

Ransomware’s success rate is so alarming that it is the subject of an all-day “summit” at this week’s RSA conference. Ironically, experts say defending against it is not terribly difficult, and how to do it is widely publicized – it’s just that not many organizations follow the free advice. Read More

Video/Webcast: SADA Systems

2017 State Of The Cloud: Cloud Is Now The Engine Powering Enterprise Digital Transformation

Join Forrester Research and SADA Systems for a discussion on the state of the cloud - the engine powering enterprise digital transformation. Forrester will present on how IT leaders can transform their business to be aligned with strategic goals and drive innovation. Read More

Top 5 Stories

1. CrowdStrike attempts to sue NSS Labs to prevent test release, court denies request
2. Cylance accuses AV-Comparatives and MRG Effitas of fraud and software piracy
3. Vendors respond to Cylance's new testing methods with AV-TEST
4. Salted Hash: RSA Conference 2017 – Live Blog
5. Privacy groups claim FBI hacking operation went too far

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.