Don't pay ransoms. But if you must, here's where to buy the Bitcoins

Email not displaying correctly? View it in your browser.

CSO

CSO Security Awareness Weekly

Apr 10, 2017
Featured Image

Scammers Phishing for financial credentials on Twitter

Scammers are using Twitter as a vehicle to target people looking for customer support or asking general questions. They interject themselves into legitimate discussions, offering friendly chatter and a link that directs the target to a Phishing page designed to harvest credentials. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Don't pay ransoms. But if you must, here's where to buy the Bitcoins
How to rescue your PC from ransomware
What enterprises can learn in the aftermath of a phishing attack
Bitcoin rise fuels social media scams
Predictive analytics can stop ransomware dead in its tracks
6 of the most effective social engineering techniques

Video/Webcast: EMA Analyst Research

Avoid Failure in Self-Service Analytics: Strategies to Ensure Success with Your Data

Join us for this informative webinar live on April 27th @ 10am PDT/ 1pm EDT to discover strategies and techniques that will encourage the creativity and analytical curiosity of your self-service community and ensure the information that your organization uses is consistent and trustworthy. Read More

Thumbnail Image

Don't pay ransoms. But if you must, here's where to buy the Bitcoins

Ransomware grew into a $1 billion industry last year, and ransom payments now account for nearly 10 percent of the entire Bitcoin economy. Avoiding becoming part of that statistic requires good endpoint security and effective backups. But what if your defenses fail, your backups are inadequate, all attempts to restore the data fail, and you have to pay the ransom after all -- what do you do? Read More

Thumbnail Image

How to rescue your PC from ransomware

Ransomware is a serious headache. Don't negotiate with e-terrorists. Be a hero and rescue your hostage PC. Read More

Thumbnail Image

What enterprises can learn in the aftermath of a phishing attack

Tychon’s Chief Technology Officer Travis Rosiek offers tips for enterprises on how to analyze former phishing attacks to improve defenses against future attacks, such as creating a database of captured phishing emails to learn tactics, who is being targeted and what information was used for social engineering. Read More

Thumbnail Image

Bitcoin rise fuels social media scams

The price of a single Bitcoin passed that of an ounce of gold for the first time this month, and scammers were quick to get in on the action with Ponzi schemes and phishing sites spread via social media. Read More

Thumbnail Image

Predictive analytics can stop ransomware dead in its tracks

Predictive analytics is a necessity because the malware of tomorrow is unknown and will surely evolve to our detriment. Find out how it finds traces of ransomware before the network goes down. Read More

Thumbnail Image
INSIDER

6 of the most effective social engineering techniques

It takes a layered approach to technology and added protections and assurances for your people to fight social engineering. Read More

White Paper: SUSE

Maximize the Power of Linux. Accelerate Embedded Development

In this paper, we will discuss the challenges and pressures embedded system developers face, and how application development can be accelerated with Linux - and more specifically, with SUSE Embedded solutions. Finally, we'll review why SUSE Embedded solutions are an ideal choice for an embedded operating system, and suggest a few ways to start bringing products to market quickly and securely. Read More

Top 5 Stories

1. Scottrade Bank data breach exposes 20,000 customer records
2. Report: 30% of malware is zero-day, missed by legacy antivirus
3. What home products are most susceptible to cyber burglars?
4. Don't pay ransoms. But if you must, here's where to buy the Bitcoins
5. Hiding in plain sight — 4 places to find cybersecurity talent

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Security Awareness Weekly as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.