Teenagers who became hackers

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

May 10, 2017
Featured Image
INSIDER

Security among the hot jobs of the future

It is clear that new technologies like robotics, self-driving cars, 3D printing, drones, artificial intelligence and virtual reality will create major upheavals in all sorts of labor markets, not just technology. (Think self-driving cars and taxi drivers.) So what are the jobs of the future? And how can you prepare for them? Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Teenagers who became hackers
50% off Logitech G602 Gaming Wireless Mouse with 250 Hour Battery Life - Deal Alert
US device searches at borders ignite resistance
How to prevent your data from being searched at the US border
Six things you need to know about IoT security
ICYMI: How to prevent your mobile app from getting hacked

eBook: Silver Peak Systems Inc

2017 Trends: SD-WAN Advances Towards Mainstream Adoption

As SD-WAN adoption continues to gain ground and go mainstream in 2017, the majority of initial enterprise deployments will be hybrid, leveraging both MPLS and a complement of broadband connectivity. Many enterprises already have some level of broadband connectivity to branch and remote locations, but these links often remain idle or are relegated to backup or disaster recovery (DR). Read More

Thumbnail Image

Teenagers who became hackers

There is of course a very long history of young people getting involved in hacking—it's become almost something of a cliché. We'll take a look at the trouble teens have managed to get into online since almost the beginning of "online" as a concept. Read More

Thumbnail Image
DealPost

50% off Logitech G602 Gaming Wireless Mouse with 250 Hour Battery Life - Deal Alert

With up to 250 hours of battery life, G602 redefines the laws of wireless gaming. From the pinpoint accuracy of the exclusive Delta Zero sensor technology to the extra high durability primary switches. Read More

Thumbnail Image

US device searches at borders ignite resistance

In CBP's fiscal year 2015, the agency searched just 8,503 devices during 383.2 million border crossings. But in fiscal year 2016, the number of device searches jumped to 19,033, and in the first six months of FY2017, CBP searched 14,993 devices, putting the agency on pace to search nearly 30,000 devices for the year. Read More

Thumbnail Image

How to prevent your data from being searched at the US border

Travelers concerned about their privacy can take steps to protect their data as they cross the U.S. border. They should remember the old Boy Scout motto: Be prepared. Read More

Thumbnail Image

Six things you need to know about IoT security

It’s in every company’s best interest to “do” IoT correctly, which will mean ratcheting up security measures to capture and ensure a good customer experience. Jack Nichols, director of product management at Genesys, proivdes six ways to do that. Read More

Thumbnail Image

ICYMI: How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use Read More

eBook: Silver Peak Systems Inc

6 Ways to Improve Your Network Security with SD-WAN

With the right SD-WAN solution, broadband internet service are secure enough for the enterprise. Read this eBook to learn six ways to use a secure SD-WAN solution to improve network security and compliance. Read More

Top 5 Stories

1. Making sense of cybersecurity qualifications
2. Third parties leave your network open to attacks
3. Job seekers beware of recruiters
4. Recent Google Docs Phishing attack is a win for Blue Teams
5. What's the key to surviving as a cyber-security start-up?

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.