Breach notification website LeakedSource allegedly raided

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jan 27, 2017
Featured Image

Report: Trump still uses his unsecured Android phone to tweet

Even after being given a new, secure device just before his inauguration, President Trump still reportedly uses his old phone. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Breach notification website LeakedSource allegedly raided
69% off Omaker M4 Portable Bluetooth Shower and Outdoor Speaker with 12 Hour Playtime - Deal Alert
Password-free security uses voice, user behavior to verify identity
New trends in zero-day vulnerabilities
What privacy profile do you fit?

eBook: Safebreach

Get a Virtual Hacker on Your Squad

Can you answer the question "Are we secure?" If you're only as strong as your security defenses, understanding how well the controls that you've deployed will stand up to attackers is critical. This eBook looks at how breach simulations can quantify your security risks and continuously validate the efficacy of your security controls. Read More

Thumbnail Image

Breach notification website LeakedSource allegedly raided

LeakedSource, a breach notification service that exposed some of 2016’s largest data breaches, might be facing a permanent shutdown. According to a forum post on a well-known marketplace, the owner of LeakedSource was raided earlier this week, though exact details of the law enforcement action remain a mystery. Read More

Thumbnail Image
DealPost

69% off Omaker M4 Portable Bluetooth Shower and Outdoor Speaker with 12 Hour Playtime - Deal Alert

Splashproof, shockproof and dustproof functions make this highly rated speaker suitable for shower or outdoor use. Features loud robust sound with a long lasting 12-hour battery. Read More

Thumbnail Image

Password-free security uses voice, user behavior to verify identity

Tired of conventional passwords? So is Nuance Communication, a tech firm that is promoting the human voice as a way to secure user accounts. Read More

Thumbnail Image

New trends in zero-day vulnerabilities

Best practices to mitigate the risks of zero day vulnerabilities Read More

Thumbnail Image

What privacy profile do you fit?

In an era of constant likes and shares, where is the privacy line drawn? Are you someone who worries about being watched as you purchasing an item online? Or do you consider loss of privacy the price you pay for having the world at your fingertips. What category do you fit into? Read More

White Paper: Safebreach

Hacker's Playbook 2nd Edition

Download the SafeBreach Hacker's Playbook, the first report of its kind to report on enterprise security trends and issues from the perspective of an attacker. Incorporating analysis of more than 4 million breach methods executed in real-world enterprise deployments, you will learn how attackers view you as a target, the mistakes security teams are making in their organization, and best practices to stay secure. Read More

Top 5 Stories

1. IRS to delay tax refunds as a security precaution
2. Your favourite VPN app is harvesting your personal information
3. How to wake the enterprise from IoT security nightmares
4. 10 scary things the TSA found on your fellow travelers
5. 7 (more) security TED Talks you can’t miss

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.