10 top holiday phishing scams

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Nov 25, 2016
Featured Image

Security basics for the holiday season, and the year to come

Consumers face, and willingly accept, a moderate amount of risk when they shop online or out in their local neighborhoods. This holiday season is no different, but the risk is elevated some, because criminals are looking for easy marks and low-hanging fruit. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

10 top holiday phishing scams
12 tips for safer Black Friday and Cyber Monday shopping
IoT attacks could bring real-world damage
6 ways to protect your organization from IoT attacks
How to dodge Black Friday and Cyber Monday shopping hackers
3 ingredients of a successful attack
Trump's national security pick is a cybersecurity hawk
Holiday shopping by mobile phone? Beware fake apps and bad Wi-Fi hotspots
New CIO paradigms for cybersecurity and prevention
How to make home IoT more secure: Assume the worst
Best small to midsized cities to land a cybersecurity job

Video/Webcast: Keeper Security

Live Webinar: How Education Institutions Protect Against the #1 Cause of Data Breach

Join us Tues. Dec. 20th, 2pm EST for a compelling webcast discussing lessons learned and insights from an IT Infrastructure Engineer at Oregon State University and a password management consultant from Keeper Security. Read More

Thumbnail Image

10 top holiday phishing scams

It always happens this time of year, an influx of holiday-related scams circulating the interwebs. Scams don't wait for the holidays, but scammers do take advantage of the increased shopping and distraction when things get busy to take your money and personal information. Here are a six holiday threats to watch out for. Read More

Thumbnail Image

12 tips for safer Black Friday and Cyber Monday shopping

12 cyber shopping tips because criminals will be using all the attacks they can this holiday season in order to score cash and gather valuable personal data that they can monetize later. Read More

Thumbnail Image

IoT attacks could bring real-world damage

Cyber experts warn that lax security of billions of new networked internet of things devices will create a target-rich environment that could have devastating consequences. Read More

Thumbnail Image

6 ways to protect your organization from IoT attacks

A recent bulletin from the FBI to private enterprises stated that the “exploitation of the Internet of Things (IoT) to conduct small-to-large scale attacks on the private industry will very likely continue.” Here's what can you do to make sure your security infrastructure is ready. Read More

Thumbnail Image

How to dodge Black Friday and Cyber Monday shopping hackers

Hackers are writing apps, setting up phony Wi-Fi networks and unleashing malware in attempts to turn legitimate Black Friday and Cyber Monday retailing into profits for themselves, according to security experts. Read More

Thumbnail Image
INSIDER

3 ingredients of a successful attack

What we mean when we talk about method, opportunity and motive. Read More

Thumbnail Image

Trump's national security pick is a cybersecurity hawk

Michael Flynn, the man President-elect Donald Trump plans to name as U.S. national security advisor, believes the government is falling behind on cybersecurity. Read More

Thumbnail Image

Holiday shopping by mobile phone? Beware fake apps and bad Wi-Fi hotspots

The smartphone risk is higher this year than in 2015. There are more active cyber criminals and many more shoppers using smartphones to find products and make purchases, either via Wi-Fi in stores or online in other locations. Read More

Thumbnail Image

New CIO paradigms for cybersecurity and prevention

Cybersecurity experts are quietly changing their approach to security. What you know and value about security prevention is eroding. The federal government's HR department learned the hard way. You don’t have to. Read More

Thumbnail Image

How to make home IoT more secure: Assume the worst

A report by the internet advisory group BITAG on Tuesday identified common security problems in home IoT products and recommended steps vendors should take from now on. Read More

Thumbnail Image

Best small to midsized cities to land a cybersecurity job

These are the best small to medium-sized cities for landing a job in the security sector, according to CyberSeek, a new data-driven heat map from CompTIA that provides real-time insight on the cybersecurity job market. Read More

eBook: A10 Networks

10 Critical Requirements for Optimizing Application Delivery

A rapidly accelerating number of complex Web 2.0 client requests for content is threatening to overwhelm your data center. Mobile users, e-commerce customers, offsite employees and remote cloud-based applications need assurance that the servers they access are constantly online. The information they seek must be received almost instantaneously. Read More

8 tips for managing without authority

When it comes to managing indirect reports, there's no substitute for experience. Here’s how two project management veterans have found success.

How to reduce Windows 10's on-disk footprint

Over time, as Windows 10 is patched repeatedly, installer files can become outdated or orphaned and occupy a lot of disk space. Two utilities can help with that.

Ready for action: 6 big ideas in digital transformation

This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here.

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.