Computer forensics follows the bread crumbs left by perpetrators

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

May 09, 2017
Featured Image

Top tips for finding the right cybersecurity products

Having trouble finding the right security products for your business? You’re not the only one. We asked experienced buyers for their tips. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Computer forensics follows the bread crumbs left by perpetrators
Get $100 Back If You Order Two Newly Announced Amazon Echo Show Devices Right Now - Deal Alert
The pitfalls of cybersecurity shopping: hype and shoddy products
Cyberspies tap free tools to make powerful malware framework
BEC attacks have hit thousands, top $5 billion in losses globally
ICYMI: How to prevent your mobile app from getting hacked

White Paper: Akamai Technologies

A Billion Mobile Sites Spare No Joy

Everybody has their favorite apps. But can you name even three mobile websites you like? We can't. it's because responsive retrofits to 20-year-old desktop web designs fail to serve us in our mobile moments of need. That's a shame because even with lousy sites, web traffic around the world will be majority-mobile by 2019. eBusiness pros have a choice. Read More

Thumbnail Image

Computer forensics follows the bread crumbs left by perpetrators

As investigators, these security pros let the clues lead them. See in a few examples how commercial software helps these techies solve the crime. Read More

Thumbnail Image
DealPost

Get $100 Back If You Order Two Newly Announced Amazon Echo Show Devices Right Now - Deal Alert

The Echo Show is now available for pre-order in black or white and starts shipping on Wednesday, June 28. Right now Amazon is also handing out $100 discounts when you order two of them and use a special code at checkout. Read More

Thumbnail Image

The pitfalls of cybersecurity shopping: hype and shoddy products

Today's cybersecurity market is beset by vaporware, exaggerated marketing claims and shady sales tactics, security managers say. Read More

Thumbnail Image

Cyberspies tap free tools to make powerful malware framework

Over the past year, a group of attackers has managed to infect hundreds of computers belonging to government agencies with a malware framework stitched together from JavaScript code and publicly available tools. Read More

Thumbnail Image

BEC attacks have hit thousands, top $5 billion in losses globally

An updated advisory form the FBI says that Business Email Compromise (BEC) attacks have become a multi-billion-dollar scam worldwide, as criminals take advantage of lax policies and human nature. Victims include businesses both large and small, operating in any number of vertical markets, proving that the criminals aren't picky about who they'll target. Read More

Thumbnail Image

ICYMI: How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use Read More

White Paper: Akamai Technologies

Application Security and Performance

Web application and DDoS attacks hit enterprises without warning or reason. The attacks can expose confidential data and website resources to malicious uses, reduce performance, and render sites unavailable. Responsible organizations proactively block web attacks to protect their reputations, site availability, site performance, and confidential data. Read More

Top 5 Stories

1. Making sense of cybersecurity qualifications
2. Third parties leave your network open to attacks
3. Job seekers beware of recruiters
4. Recent Google Docs Phishing attack is a win for Blue Teams
5. What's the key to surviving as a cyber-security start-up?

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.