Doctored Jim Acosta video shows why fakes don’t need to be deep to be dangerous

Email not displaying correctly? View it in your browser.

CSO

CSO Daily

Nov 09, 2018
Featured Image

Learn to play defense by hacking these broken web apps

OWASP's Broken Web Applications Project makes it easy to learn how to hack web applications--a critical skill for web application developers playing defense, junior penetration testers, and security-curious management. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Doctored Jim Acosta video shows why fakes don’t need to be deep to be dangerous
New CISO appointments, November 2018
Critical authentication flaw in DJI drone web app fixed
State of cybercrime 2018: Security spending up, but so are the risks
Top application security tools for 2019
Thumbnail Image

Doctored Jim Acosta video shows why fakes don’t need to be deep to be dangerous

White House promotion of an allegedly doctored press conference video shows how "shallow fakes" can manipulate opinion. Read More

Thumbnail Image

New CISO appointments, November 2018

Find up-to-date news of CSO, CISO and other senior security executive appointments. Read More

Thumbnail Image

Critical authentication flaw in DJI drone web app fixed

Check Point researcher finds vulnerability that could have allowed attackers to spy on drone fleets in real time. Read More

Thumbnail Image
INSIDER

State of cybercrime 2018: Security spending up, but so are the risks

IT and security management use more technology to defend against sophisticated hacker attacks, but still lag on security training. Read More

Thumbnail Image
INSIDER

Top application security tools for 2019

Checking for security flaws in your applications is essential. These tools can help find and fix them. Read More

Editor’s Picks

1. 10 essential enterprise security tools (and 11 nice-to-haves)
2. 7 best practices for negotiating ransomware payments
3. Are long passphrases the answer to password problems?
4. Bruce Schneier's Click Here to Kill Everybody reveals the looming cybersecurity crisis
5. Cybercriminals are using blockchain to improve security. Should you?
6. 5 hard truths every CISO should know
7. What it takes to be a security consultant

Get Security Smart

From the editors of CSO, Security Smart is a quarterly security awareness newsletter ready for distribution in your organization. Subscribe now and arm your employees with the information they need to be more secure at home and at work. Learn more.
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.