Cyber security researchers in high demand

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Apr 07, 2017
Featured Image

Scammers Phishing for financial credentials on Twitter

Scammers are using Twitter as a vehicle to target people looking for customer support or asking general questions. They interject themselves into legitimate discussions, offering friendly chatter and a link that directs the target to a Phishing page designed to harvest credentials. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Cyber security researchers in high demand
20% off Pre-Order of Prey for Xbox One, PS4 and PC - Deal Alert
US says laptop ban may expand to more airports
F-Secure buys Little Flocker to combat macOS ransomware
Antivirus headaches that compromise browser security
Apache Struts 2 exploit used to install ransomware on servers
US trade lobbying group attacked by suspected Chinese hackers

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

Cyber security researchers in high demand

As more software is developed, the likelihood of zero day vulnerabilities going undiscovered increases. Now more than ever, bug researchers are needed to defend against zero day exploits. Read More

Thumbnail Image
DealPost

20% off Pre-Order of Prey for Xbox One, PS4 and PC - Deal Alert

Amazon Prime members get an exclusive 20% off the pre-order of Prey. In Prey, you awaken aboard Talos I, a space station orbiting the moon in the year 2032. You are the key subject of an experiment meant to alter humanity forever – but things have gone terribly wrong. Read More

Thumbnail Image

US says laptop ban may expand to more airports

The U.S. might add other airports to its ban restricting passengers from bringing laptops on board certain flights from the Middle East. Read More

Thumbnail Image

F-Secure buys Little Flocker to combat macOS ransomware

Endpoint security vendor F-Secure has acquired a behavior-based security application for macOS called Little Flocker that was developed by an independent researcher. Read More

Thumbnail Image

Antivirus headaches that compromise browser security

Why web browsers leave security engineers constantly playing defense. Read More

Thumbnail Image

Apache Struts 2 exploit used to install ransomware on servers

Attackers are exploiting a vulnerability patched last month in the Apache Struts web development framework to install ransomware on servers. Read More

Thumbnail Image

US trade lobbying group attacked by suspected Chinese hackers

A group of what appears to be Chinese hackers infiltrated a U.S. trade-focused lobbying group as the two countries wrestle with how they treat imports of each other's goods and services. Read More

White Paper: AppDynamics

10 Things Your CIO Should Know About DevOps

DevOps has taken the IT world by storm over the last few years and continues to transform the way organizations develop, deploy, monitor, and maintain applications, as well as modifying the underlying infrastructure. DevOps has quickly evolved from a niche concept to a business imperative and companies of all sizes should be striving to incorporate DevOps tools and principles. Read More

Top 5 Stories

1. Don't pay ransoms. But if you must, here's where to buy the Bitcoins
2. Top 5 email security best practices to prevent malware distribution
3. Email security appears grounded as attacks continue to take flight
4. Hackers continue to troll LinkedIn
5. 7 sexy high-tech enterprise ‘surveillance engineer techniques that criminal hackers use

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.