Politicians' web browsing history targeted after privacy vote

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Apr 05, 2017
Featured Image

Old attack code is new weapon for Russian hackers

Researchers found commonalities between tools used against Solaris 20 years ago and modern-day attacks deployed against Windows PCs Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Politicians' web browsing history targeted after privacy vote
20% off Sniper Ghost Warrior 3 Season Pass Edition Pre-order - Deal Alert
Apple fixes wireless-based remote code execution flaw in iOS
Privacy rollback can cause headaches for corporate security pros
What home products are most susceptible to cyber burglars?
A free decryption tool is now available for all Bart ransomware versions
Banking hackers left a clue that may link them to North Korea

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

Politicians' web browsing history targeted after privacy vote

Two GoFundMe campaigns have raised more than US$290,000 in an effort to buy the web browsing histories of U.S. politicians after Congress voted to allow broadband providers to sell customers' personal information without their permission. Read More

Thumbnail Image
DealPost

20% off Sniper Ghost Warrior 3 Season Pass Edition Pre-order - Deal Alert

Go behind enemy lines with the ultimate modern military shooter. Pre-order this season pass edition and get extra add-ons and a 20% discount for Prime members. Read More

Thumbnail Image

Apple fixes wireless-based remote code execution flaw in iOS

Apple fixed a serious vulnerability that could allow attackers to remotely execute malicious code on the Broadcom Wi-Fi chips used in iPhones, iPads, and iPods. Read More

Thumbnail Image

Privacy rollback can cause headaches for corporate security pros

Corporate security pros can add a new task to their busy days: handling panicky employees worried about privacy who are using the onion router (Tor) browser as a way to protect their online activity. Read More

Thumbnail Image

What home products are most susceptible to cyber burglars?

In the matter of the Dyn situation, it was those Internet of Things devices that created the voluminous distributed denial of sevice attack. A DVR was used to attack Dyn’s network. To reduce the impact of such attacks, officials at InsuranceQuotes have noted some of the more popular smart home gadgets in your home that could be vulnerable. Read More

Thumbnail Image

A free decryption tool is now available for all Bart ransomware versions

Antivirus vendor Bitdefender has released a free decryption tool that works for any files affected by the Bart ransomware. Read More

Thumbnail Image

Banking hackers left a clue that may link them to North Korea

The notorious hackers behind a string of banking heists have left behind a clue that reveals a long-suspected link to North Korea, according to security researchers. Read More

eBook: Solarwinds MSP

5 Best Practices for Onboarding New Customers

With a clear plan and excellent communication, you can ensure onboarding is a positive experience for new customers and your team. Download our eBook to learn about five best practices to help you efficiently and expertly welcome your new customers, giving them the knowledge and support they need to succeed. Read More

Top 5 Stories

1. Hackers continue to troll LinkedIn
2. Open-source developers targeted in sophisticated malware attack
3. 7 sexy high-tech enterprise ‘surveillance engineer' techniques that criminal hackers use
4. Congress to US citizens: Want online privacy? Pay up!
5. Myth-busting the urban legends surrounding the energy sector

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.