Terror suspect's locked iPhone could lead to a second Apple-FBI showdown

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Oct 11, 2016
Featured Image

US may use sanctions to punish Russia for election hacking

The U.S. response to election-related hacks that the Obama administration now blames on the Russian government could include sanctions against that country. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Terror suspect's locked iPhone could lead to a second Apple-FBI showdown
Get a Fire HD 6 Tablet Reburbished For Just $45 With Code IDG11, Until Wed Only - Deal Alert
WikiLeaks dumps another trove of email, allegedly from Clinton aide
Potential Apple Watch snooping: a not-so-paranoid cyberespionage risk
Diversity, STEM and Ada Lovelace Day

White Paper: Sapho

Accelerate Digital Transformation With Simplified Business Apps

65% of employees ignore data when making a decision and 62% delay completing tasks that require logging into multiple systems. This Forrester paper discusses how business apps are used and how the right apps will empower employees to make data-driven decisions, solve business problems, and be more connected to the business. Read More

Thumbnail Image

Terror suspect's locked iPhone could lead to a second Apple-FBI showdown

The FBI wants to access data on a locked iPhone owned by a dead stabbing suspect with alleged ties to ISIS. Read More

Thumbnail Image
DealPost

Get a Fire HD 6 Tablet Reburbished For Just $45 With Code IDG11, Until Wed Only - Deal Alert

Until Wednesday only, using our special discount code will get you a certified refurbished Fire HD 6 Tablet for an extra 20% off its already discounted price of $56 on Amazon. See our article for details. Read More

Thumbnail Image

WikiLeaks dumps another trove of email, allegedly from Clinton aide

U.S. accusations that WikiLeaks is helping Russian hackers influence the upcoming election hasn't phased the controversial website from dumping emails allegedly stolen from a Hillary Clinton aide. Read More

Thumbnail Image

Potential Apple Watch snooping: a not-so-paranoid cyberespionage risk

It may sound paranoid, but the next time you enter into a highly confidential meeting, leave your smart watch behind. It's possible the device could be spying on you. Read More

Thumbnail Image

Diversity, STEM and Ada Lovelace Day

Celebrate diversity. Get kids interested in STEM. Help them become aware of the people that are changing the world. Read More

White Paper: Red Hat

Alleviate Technical Debt

For many organizations, IT modernization comes down to deciding whether to perform top-to-bottom modernization of an organization's datacenter or to strategically modernize with those components that add efficiency, manageability, agility and cost savings to IT operations. Read More

Top 5 Stories

1. Here are the 61 passwords that powered the Mirai IoT botnet
2. These ransomware tricks fool the most hardened security pro
3. Five tips for protecting your brand on social media
4. Android malware that can infiltrate corporate networks is spreading
5. Investment fund loses $6 million in BEC scam, suspends operations

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.