Antivirus headaches that compromise browser security

Email not displaying correctly? View it in your browser.

CSO

CSO Newswatch

Apr 07, 2017
Featured Image

Scammers Phishing for financial credentials on Twitter

Scammers are using Twitter as a vehicle to target people looking for customer support or asking general questions. They interject themselves into legitimate discussions, offering friendly chatter and a link that directs the target to a Phishing page designed to harvest credentials. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Antivirus headaches that compromise browser security
US says laptop ban may expand to more airports
How to securely deploy medical devices
F-Secure buys Little Flocker to combat macOS ransomware
US trade lobbying group attacked by suspected Chinese hackers
Apache Struts 2 exploit used to install ransomware on servers

White Paper: AppDynamics

10 Things Your CIO Should Know About DevOps

DevOps has taken the IT world by storm over the last few years and continues to transform the way organizations develop, deploy, monitor, and maintain applications, as well as modifying the underlying infrastructure. DevOps has quickly evolved from a niche concept to a business imperative and companies of all sizes should be striving to incorporate DevOps tools and principles. Read More

Thumbnail Image

Antivirus headaches that compromise browser security

Why web browsers leave security engineers constantly playing defense. Read More

Thumbnail Image

US says laptop ban may expand to more airports

The U.S. might add other airports to its ban restricting passengers from bringing laptops on board certain flights from the Middle East. Read More

Thumbnail Image

How to securely deploy medical devices

Open Web Application Security Project (OWASP) has released a set of best practices for the secure deployment of those devices. Read More

Thumbnail Image

F-Secure buys Little Flocker to combat macOS ransomware

Endpoint security vendor F-Secure has acquired a behavior-based security application for macOS called Little Flocker that was developed by an independent researcher. Read More

Thumbnail Image

US trade lobbying group attacked by suspected Chinese hackers

A group of what appears to be Chinese hackers infiltrated a U.S. trade-focused lobbying group as the two countries wrestle with how they treat imports of each other's goods and services. Read More

Thumbnail Image

Apache Struts 2 exploit used to install ransomware on servers

Attackers are exploiting a vulnerability patched last month in the Apache Struts web development framework to install ransomware on servers. Read More

White Paper: CA Technologies

APM Essentials: Navigating the Maze of End User Experience Solutions

This EMA white paper offers clarity into selecting Application Performance Management and End User Experience solutions. Read More

Top 5 Stories

1. Don't pay ransoms. But if you must, here's where to buy the Bitcoins
2. Top 5 email security best practices to prevent malware distribution
3. Email security appears grounded as attacks continue to take flight
4. Hackers continue to troll LinkedIn
5. 7 sexy high-tech enterprise ‘surveillance engineer techniques that criminal hackers use

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Newswatch as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.