CSO

CSO Daily

August 09, 2019

Image: Popular Avaya enterprise VoIP phones are vulnerable to hacking

Popular Avaya enterprise VoIP phones are vulnerable to hacking

Attackers can use the vulnerability to gain complete control of the phone. It underscores the risks of using old open-source code in IoT devices. Read more ▶

Your Must-Read Stories

•

Smishing and vishing: How these cyber attacks work and how to prevent them

•

Black Hat keynote: Why security culture needs to change

•

Know your Edge Chromium security options

•

Famous social engineering attacks: 12 crafty cons

•

New Spectre-like CPU vulnerability bypasses existing defenses

•

11 new state privacy and security laws explained: Is your business ready?

White Paper: Dell Technologies and Intel®

Embrace Smart Collaboration to Drive Innovation

To help employees stay productive, you need to embrace all the ways they want to work, which means anywhere, anytime, with anyone, and on any device. This is not just a nice-to-have strategic initiative — it’s an operational imperative in today’s interconnected business environment, where most workers report that being able to work and collaborate from home (or anywhere else) helps them get more done. Read this executive brief to discover how the right security solutions and technology mix can allow your company to adapt to the need for smart collaboration. Read more ▶

Image: Smishing and vishing: How these cyber attacks work and how to prevent them

Smishing and vishing: How these cyber attacks work and how to prevent them

Smishing and vishing are types of phishing attacks that try to lure victims via SMS message and voice calls. Both rely on the same emotional appeals employed in traditional phishing scams and are designed to drive you into urgent action. The difference is the delivery method. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Black Hat keynote: Why security culture needs to change

Black Hat keynote: Why security culture needs to change

Dino Dai Zovi tells Black Hat audience to embrace a culture where security is everyone's job and risks are shared. Automation with feedback loops also key to solving security challenges at scale Read more ▶

 
 
Image: Know your Edge Chromium security options

Know your Edge Chromium security options

Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know. Read more ▶

Image: Famous social engineering attacks: 12 crafty cons

Famous social engineering attacks: 12 crafty cons

This rogues gallery of social engineering attack examples made headlines by taking advantage of human nature. Read more ▶

Image: New Spectre-like CPU vulnerability bypasses existing defenses

New Spectre-like CPU vulnerability bypasses existing defenses

The SWAPGS vulnerability can allow attackers to access contents of kernel memory addresses. Microsoft and Intel have coordinated on a mitigation. Read more ▶

Image: 11 new state privacy and security laws explained: Is your business ready?

11 new state privacy and security laws explained: Is your business ready?

States from Maine to California have recently enacted privacy, data security, cybersecurity, and data breach notification laws. Let's break down what each of these laws entails and how businesses and consumers are affected. Read more ▶

White Paper: Dell EMC and Intel®

Hardware Does Matter: Global Server Brands are Perceived as Superior for Driving Digital Business

In this report, we evaluate market misperceptions surrounding server functionality. We present data on server adoption and perceptions, based on the 2019 Frost & Sullivan Server Preference survey, and show which selection criteria IT leaders considered most important. Finally, we offer recommendations for assessing server brands to determine which will best meet your business needs. Download this report provided by Dell EMC and Intel® to learn more. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.