FBI warns of attacks on anonymous FTP servers

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Mar 29, 2017
Featured Image

Study finds devices are not wiped properly

The National Association for Information Destruction (NAID) found in a recent study that 40 percent of the devices that bought from secondhand markets had PII on them. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

FBI warns of attacks on anonymous FTP servers
47% off First Alert 10-Year Carbon Monoxide Alarm with Temperature - Deal Alert
LastPass is scrambling to fix another serious vulnerability
How to respond to device and software backdoors inserted or left by vendors
Insecure security cameras sound like a joke, but aren’t
AI will transform information security, but it won’t happen overnight

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

FBI warns of attacks on anonymous FTP servers

The FBI warns that attackers are targeting vulnerable FTP servers used by small medical and dental offices as a way to obtain medical records and other personal information. Read More

Thumbnail Image
DealPost

47% off First Alert 10-Year Carbon Monoxide Alarm with Temperature - Deal Alert

Powered by sealed, ten year lithium batteries to provide continuous protection for ten years without battery replacement, this CO alarm's modern, compact design allows easy tabletop or wall mount placement and displays CO levels along with room temp on a backlit display. Read More

Thumbnail Image

LastPass is scrambling to fix another serious vulnerability

Developers of the popular LastPass password manager are working to fix a serious vulnerability that could allow malicious websites to steal user passwords or to infect computers with malware. Read More

Thumbnail Image
INSIDER

How to respond to device and software backdoors inserted or left by vendors

CSO looks at vendor backdoors, how they get into products, the challenges to finding these, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma. Read More

Thumbnail Image

Insecure security cameras sound like a joke, but aren’t

They’re an example of big tech companies’ failure to take security seriously. Read More

Thumbnail Image

AI will transform information security, but it won’t happen overnight

Artificial Intelligence technologies are evolving quickly, but can they aid an InfoSec community still grappling with default passwords and SQLi attacks? Read More

Video/Webcast: PhishMe, Inc.

2016 Malware Year in Review: Tricks, Threats, and Triumph

Listen to PhishMe Threat Intelligence Expert, Brendan Griffin, to learn about the widespread implementation of anti-analysis methods, a notable evolution in techniques and tools to deliver malware, and the growing threat of encryption ransomware. Now more than ever, it has become more important to detect and interdict malware during the delivery phase. Read More

Top 5 Stories

1. These 10 people may be your greatest inside security risks
2. Hackers threaten to wipe millions of Apple devices, demand ransom
3. Free security tools to support cyber security efforts
4. 6 of the most effective social engineering techniques
5. Bot attacking gift card accounts

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.