IBM warns of rising VoIP cyber-attacks

Email not displaying correctly? View it in your browser.

CSO

CSO Newswatch

Dec 02, 2016
Featured Image

Implantable medical devices can be hacked to harm patients

It's possible to transmit life-threatening signals to implanted medical devices with no prior knowledge of how the devices work, researchers in Belgium and the U.K. have demonstrated. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

IBM warns of rising VoIP cyber-attacks
Scholars, infosec experts call for action on Russian hacking
Data-wiping malware strikes Saudi government agencies
Major cybercrime network Avalanche dismantled in global takedown

eBook: Cyber-Ark Software Inc

CyberArk eBook - Achieving Protection and Productivity by Securing Privilege on the Endpoint

Local administrator rights and application control are better together. Removing local administrator rights can mitigate the risk of some endpoint attacks, but not all. For more effective endpoint protection, organizations should employ a combination of privilege management and application control. Read More

Thumbnail Image

IBM warns of rising VoIP cyber-attacks

IBM says common Session Initiation Protocol (SIP) and SIP and Cisco Skinny Client Control Protocol (SCCP) are most common targets. Read More

Thumbnail Image

Scholars, infosec experts call for action on Russian hacking

In the wake of reports about Russian involvement in fake news and hacks against political targets leading up to the recent presidential election, scholars and security experts are calling for federal action Read More

Thumbnail Image

Data-wiping malware strikes Saudi government agencies

Saudia Arabia’s government agencies were hit with a cyber attack that security researchers are blaming on a worm-like malware that can wipe computer systems, destroying data. Read More

Thumbnail Image

Major cybercrime network Avalanche dismantled in global takedown

Law enforcement agencies have dismantled a major cybercriminal network responsible for malware-based attacks that have been harassing victims across the globe for years. Read More

White Paper: Cyber-Ark Software Inc

CyberArk Labs - Analyzing Ransomware and Potential Mitigation Strategies

CyberArk Labs blocked 100% of the ransomware tested across 157,000 samples. How? By greylisting unknown applications, creating policies to restrict access, and protecting sensitive assets inside the organization. A smart approach. Read More

Top 5 Stories

1. Ransomware forces SFMTA to give free rides, $73,000 demanded by attackers
2. 10 top holiday phishing scams
3. SF MUNI hacker lashes out, threatens to release 30GBs of compromised data
4. Best practices to fight corporate security risks
5. Feds provide legal loophole to hacking IoT devices

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Newswatch as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.