10 security risks of wearables

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Mar 29, 2017
Featured Image

Scammers scare iPhone users into paying to unlock not-really-locked Safari

Apple has patched a bug in the iOS version of Safari that was used by criminals to spook users into paying $125 or more because they thought the browser was broken. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

10 security risks of wearables
38% off Seagate Backup Plus Ultra Slim 2TB Portable External Hard Drive - Deal Post
AI will transform information security, but it won’t happen overnight
Expert: NY breach report highlights third-party risk
Feds to battle cybersecurity with analytics
ICYMI: How to respond to a cyber attack

Video/Webcast: IBM Corporation

Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations

Security teams looking to extend their network perimeter defenses with an attack and breach detection capability are discovering that a hosted SIEM gets them up and running faster. Read More

Thumbnail Image

10 security risks of wearables

Fitness trackers may not present a huge security risk, but any connected device can be hacked. Here’s what you need to know to minimize those security and privacy threats. Read More

Thumbnail Image
DealPost

38% off Seagate Backup Plus Ultra Slim 2TB Portable External Hard Drive - Deal Post

The Backup Plus Ultra Slim Portable Drive is one of Seagate's thinnest and most eye-catching portable hard drives Read More

Thumbnail Image

AI will transform information security, but it won’t happen overnight

Artificial Intelligence technologies are evolving quickly, but can they aid an InfoSec community still grappling with default passwords and SQLi attacks? Read More

Thumbnail Image

Expert: NY breach report highlights third-party risk

New York reported a record high number of breaches last year, just after a new set of cybersecurity regulations went into effect in the state. Read More

Thumbnail Image

Feds to battle cybersecurity with analytics

With more real-time information sharing, officials envision cyber defenses moving from 'vaccine' to 'immune system,' a big analytics project that could achieve something like automatic security. Read More

Thumbnail Image

ICYMI: How to respond to a cyber attack

Following a breach, organizations should focus on mitigating damage and data loss and providing information to law enforcement. Partner at Ballard Spahr, LLP and former Assistant U.S. Attorney Ed McAndrew and Guidance Software President and CEO Patrick Dennis have compiled best practices for preparing and responding to a cyber-attack and working with law enforcement. Read More

Video/Webcast: CenturyLink

Five Steps to Drive Digital Transformation with Hybrid Cloud

Your multi-cloud future is here - how will you manage it? This on-demand webcast presented by Dave Bartoletti of Forrester Research and Dave Shacochis of CenturyLink discusses the current state of hybrid cloud in the enterprise and why the move is on to transform enterprise applications using multiple cloud platforms. Read More

Top 5 Stories

1. Three privacy tools that block your Internet provider from tracking you
2. API flaws said to have left Symantec SSL certificates vulnerable to compromise
3. Bot attacking gift card accounts
4. If you think ransomware is a user failure, you’re a failure
5. Social engineering fake outs

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.