Personal data of 550,000 Red Cross blood donors was breached

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Oct 28, 2016
Featured Image

Malware from Friday's DDoS attack continues to harass in short bursts

It's still unclear who pulled off Friday's massive internet disruption, but the malware largely responsible for the cyber attack has since been found assaulting new targets -- possibly video gamers. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Personal data of 550,000 Red Cross blood donors was breached
73% off TechMatte Air Vent Magnetic Universal Car Mount for Smartphones - Deal Alert
No need to shoot down drones! Many of them can now be hijacked
Pennsylvania man sentenced to 18 months for celeb hacking
The limits of encryption

Case Study: IBM Corporation

Case Study: Simplify, Save and Innovate

Learn how IBM helped a leading bank's IT organization focus on innovation and strategic projects while massively reducing costs and streamlining operations. Read More

Thumbnail Image

Personal data of 550,000 Red Cross blood donors was breached

The Australian Red Cross said its blood donor service has found that registration information of 550,000 donors had been compromised, which the agency blamed on human error by a third-party contractor. Read More

Thumbnail Image
DealPost

73% off TechMatte Air Vent Magnetic Universal Car Mount for Smartphones - Deal Alert

The MagGrip Vent Car Mount is a sturdy, cradle-less device holding system focused on simplicity. Pop it onto your car's air vent and magnets do all the work. Currently discounted to just $8. Read More

Thumbnail Image

No need to shoot down drones! Many of them can now be hijacked

A security researcher has devised a method of hijacking a wide variety of radio controlled airplanes, helicopters, cars, boats and other devices that use a popular wireless transmission technology. Read More

Thumbnail Image

Pennsylvania man sentenced to 18 months for celeb hacking

A Pennsylvania man was sentenced to 18 months in federal prison on charges of hacking the Google and Apple email accounts of over 100 people including celebrities, and getting access to nude videos and photographs of some people. Read More

Thumbnail Image

The limits of encryption

The latest WikiLeaks revelations included a reminder that there are revealing things that just can’t be encrypted. Read More

White Paper: IBM Corporation

Driving Innovation through IBM Application Modernization

A unique point-of-view prepared by IBM Digital Foundation services on how we can help improve application and system performance while reducing costs. Read More

Top 5 Stories

1. John McAfee: 'Iran hacked the DNC, and North Korea hacked DYN'
2. Amateurs were behind the Dyn Inc. DDoS attack, report says
3. Overweight, out of shape: Hack your body back
4. Chinese firm admits its hacked products were behind Friday's massive DDOS attack
5. Bots may be trumping online polls

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.