How to respond to device and software backdoors inserted or left by vendors

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Mar 28, 2017
Featured Image

Ignore that call from “Apple” about an iCloud breach

Scammers leverage an alleged iCloud account leak that also is likely not real. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to respond to device and software backdoors inserted or left by vendors
44% off Smartphone Screen Magnifier with Foldable Stand - Deal Alert
Social engineering fake outs
If you think ransomware is a user failure, you’re a failure
Continuous IT audits are needed to combat today's cyber threats
Problems that arise with cloud to cloud interactions
Study finds devices are not wiped properly

Video/Webcast: PhishMe, Inc.

2016 Malware Year in Review: Tricks, Threats, and Triumph

Listen to PhishMe Threat Intelligence Expert, Brendan Griffin, to learn about the widespread implementation of anti-analysis methods, a notable evolution in techniques and tools to deliver malware, and the growing threat of encryption ransomware. Now more than ever, it has become more important to detect and interdict malware during the delivery phase. Read More

Thumbnail Image
INSIDER

How to respond to device and software backdoors inserted or left by vendors

CSO looks at vendor backdoors, how they get into products, the challenges to finding these, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma. Read More

Thumbnail Image
DealPost

44% off Smartphone Screen Magnifier with Foldable Stand - Deal Alert

Enlarge your smartphone's display and watch a bigger screen at a longer distance, minimizing eye fatigue. Designed to be foldable, lightweight and portable. Currently discounted 44%. Read More

Thumbnail Image

Social engineering fake outs

Learn how a consultant infiltrated his client’s buildings and networks. Read More

Thumbnail Image

If you think ransomware is a user failure, you’re a failure

It is easy to blame users for causing ransomware infections of their own systems. However, the reality is that for the user to infect their system, there are many technical failures, which are due to the IT staff’s actions or lack there of. Read More

Thumbnail Image

Continuous IT audits are needed to combat today's cyber threats

It's time to shift to continuous audits as cyber threats are dynamic and constantly changing, we can no longer afford to take a static snapshot of critical IT systems. Read More

Thumbnail Image

Problems that arise with cloud to cloud interactions

Some companies have multiple applications in different public clouds. There is a possibility that some public cloud applications need to access another public cloud's application data. Should this architecture be allowed? Read More

Thumbnail Image

Study finds devices are not wiped properly

The National Association for Information Destruction (NAID) found in a recent study that 40 percent of the devices that bought from secondhand markets had PII on them. Read More

Research/Infographic: PhishMe, Inc.

2016 Year in Review Malware Infographic

An at-a-glance 2016 Year in Review Malware Infographic, with a close look at the fastest-growing attack vector of the past year: Ransomware. PhishMe's research team found that the explosive growth of ransomware was the most significant trend of 2016. The extraordinary increase in the number of ransomware attacks made destructive malware a fixture on the threat landscape. Read More

Top 5 Stories

1. These 10 people may be your greatest inside security risks
2. Hackers threaten to wipe millions of Apple devices, demand ransom
3. Free security tools to support cyber security efforts
4. 6 of the most effective social engineering techniques
5. Bot attacking gift card accounts

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.