CSO

CSO Daily

December 11, 2019

Image: How to secure your DNS traffic under Windows

How to secure your DNS traffic under Windows

DNS traffic is prone to snooping, and it’s often far too easy for attackers to hijack and change a company’s DNS settings. These simple steps will amp up your DNS protection. Read more ▶

Your Must-Read Stories

•

Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves

•

The race for quantum-proof cryptography

•

Cryptominers and fileless PowerShell techniques make for a dangerous combo

•

How a nuclear plant got hacked

•

9 top fuzzing tools: Finding the weirdest application errors

•

4 authentication use cases: Which protocol to use?

White Paper: Mobius Partners

Data Management for The Intelligent Enterprise

This guide will give you a path to get ahead of the curve. We describe what a next-generation intelligent data platform is, what it does and how it works. Read more ▶

Image: Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves

Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves

By manipulating the voltage of Intel CPUs that use SGX, researchers can extract sensitive data, including full RSA encryption keys, from memory using the Plundervolt vulnerability. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: The race for quantum-proof cryptography

The race for quantum-proof cryptography

Lawmakers briefed on quantum computing’s threat to encryption and the urgent need for mathematical research. Read more ▶

 
 
Image: Cryptominers and fileless PowerShell techniques make for a dangerous combo

Cryptominers and fileless PowerShell techniques make for a dangerous combo

This new dual-payload cryptojacking malware can disable Windows Antimalware Scan Interface and inject itself directly into memory of legitimate processes. Read more ▶

Image: How a nuclear plant got hacked

How a nuclear plant got hacked

India's Kudankulam Nuclear Power Plant (KNPP) publicly admitted they discovered malware on their networks. It likely could have been easily avoided. Read more ▶

Image: 9 top fuzzing tools: Finding the weirdest application errors

9 top fuzzing tools: Finding the weirdest application errors

Fuzz testing tools root out odd programming errors that might result in dangerous unexpected application errors that attackers can exploit. Read more ▶

Image: 4 authentication use cases: Which protocol to use?

4 authentication use cases: Which protocol to use?

Choosing the wrong authentication protocol could undermine security and limit future expansion. These are the recommended protocols for common use cases. Read more ▶

White Paper: Mobius Partners

How Hybrid Cloud Solutions Drive Digital Transformation

Examine the key challenges associated with digital transformation — and how HPE hybrid cloud solutions help businesses address these challenges. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2019 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com