CSO Security Awareness Weekly |
| |
|
Scammers are using Twitter as a vehicle to target people looking for customer support or asking general questions. They interject themselves into legitimate discussions, offering friendly chatter and a link that directs the target to a Phishing page designed to harvest credentials. Read More ▶ |
|
| Video/Webcast: EMA Analyst Research Join us for this informative webinar live on April 27th @ 10am PDT/ 1pm EDT to discover strategies and techniques that will encourage the creativity and analytical curiosity of your self-service community and ensure the information that your organization uses is consistent and trustworthy. Read More ▶ | Ransomware grew into a $1 billion industry last year, and ransom payments now account for nearly 10 percent of the entire Bitcoin economy. Avoiding becoming part of that statistic requires good endpoint security and effective backups. But what if your defenses fail, your backups are inadequate, all attempts to restore the data fail, and you have to pay the ransom after all -- what do you do? Read More ▶ |
| Ransomware is a serious headache. Don't negotiate with e-terrorists. Be a hero and rescue your hostage PC. Read More ▶ |
| | Tychon’s Chief Technology Officer Travis Rosiek offers tips for enterprises on how to analyze former phishing attacks to improve defenses against future attacks, such as creating a database of captured phishing emails to learn tactics, who is being targeted and what information was used for social engineering. Read More ▶ |
| The price of a single Bitcoin passed that of an ounce of gold for the first time this month, and scammers were quick to get in on the action with Ponzi schemes and phishing sites spread via social media. Read More ▶ |
| Predictive analytics is a necessity because the malware of tomorrow is unknown and will surely evolve to our detriment. Find out how it finds traces of ransomware before the network goes down. Read More ▶ |
| It takes a layered approach to technology and added protections and assurances for your people to fight social engineering. Read More ▶ |
| White Paper: SUSE In this paper, we will discuss the challenges and pressures embedded system developers face, and how application development can be accelerated with Linux - and more specifically, with SUSE Embedded solutions. Finally, we'll review why SUSE Embedded solutions are an ideal choice for an embedded operating system, and suggest a few ways to start bringing products to market quickly and securely. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|