Kaspersky: Ransomware that encrypts is booming

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Jul 04, 2016
Featured Image
INSIDER

June 2016: The month in hacks and breaches

Here's how the summer is heating up for hackers. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Kaspersky: Ransomware that encrypts is booming
Brown University offers Ivy League CISO creds
Time is short to stop expansion of FBI hacking, senator says
What security pros can learn from the networking team
Hillary Clinton's tech agenda draws cheers from IT industry
Hackers are coming for your healthcare records -- here’s why
Jeremiah Grossman: Focus on ransomware, SDLC, and endpoints
Over 100 DDoS botnets built using Linux malware for embedded devices

White Paper: xMatters

2016 Communication Best Practices for Data Breach & Service Outages

Read this whitepaper to learn about the new 2016 regulations and how you can proactively take action to prepare your organization for any potential major incidents. Read More

Thumbnail Image

Kaspersky: Ransomware that encrypts is booming

Over the past year the number of machines hit by ransomware that encrypts all or part of the hard drive is five-and-a-half times what it was the year before, according to Kaspersky Lab. Read More

Thumbnail Image

Brown University offers Ivy League CISO creds

Freshly minted CISOs as well as other mid-career professionals with a need for a broad grounding in cybersecurity can get an advanced degree in the topic through a new program at Brown University. Read More

Thumbnail Image

Time is short to stop expansion of FBI hacking, senator says

The U.S. Congress has a small window of time to stop proposed changes in federal court rules that will expand the FBI's authority to hack into computers during criminal investigations, a senator said Thursday. Read More

Thumbnail Image

What security pros can learn from the networking team

In truth, your security team has a lot to learn from the networking team about how to keep the whole organization running smoothly. We spoke to networking experts to find out what they most wanted security pros to know. Read More

Thumbnail Image

Hillary Clinton's tech agenda draws cheers from IT industry

Presumptive Democratic nominee calls for investments in STEM education, cybersecurity and job training, pledging to make an open Internet a cornerstone of her administration's diplomacy. Read More

Thumbnail Image

Hackers are coming for your healthcare records -- here’s why

Because patient information can be so lucrative, healthcare organizations and insurance companies are being targeted by hackers and should expect to eventually suffer a security breach. Read More

Thumbnail Image

Jeremiah Grossman: Focus on ransomware, SDLC, and endpoints

The noted web security guru worries that the key web and application threats aren't getting the right level of focus Read More

Thumbnail Image

Over 100 DDoS botnets built using Linux malware for embedded devices

LizardStresser, the DDoS malware for Linux systems written by the infamous Lizard Squad attacker group, was used over the past year to create over 100 botnets, some built almost exclusively from compromised internet-of-things devices. Read More

White Paper: Imperva

2016 Cyberthreat Defense Report

Read the new 2016 Cyberthreat Defense Report and find out how 1000 IT security decision makers defend against today's internal and external threats. Read More

Get your analytics program the recognition it deserves!

The Analytics 50, a collaboration between Drexel University's LeBow College of Business and CIO.com, will recognize 50 of the most innovative analytics executives. Nominate your project today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.