Three more firms hit by targeted Phishing attacks seeking W2 data

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Mar 07, 2016
Featured Image

Verizon provides a behind the scenes look at data breaches

Without naming names, Verizon provides a bit of background information on some of its most intriguing cases. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Three more firms hit by targeted Phishing attacks seeking W2 data
'Serious risk' that Apple-made iPhone cracking code will leak
Ransomware developers target Apple customers
Post-RSA Conference blues? Get ready for a CSO confab!

White Paper: Brocade Communications Systems Inc

Forrester: Conquer Business-Critical Workloads with Dedicated Storage Networks

While business-critical workloads are very difficult to predict -- the one certainty is that they are increasing. This study shows how improving app workload performance reduces downtime, and makes for happier customers and more efficient staff. Read More

Thumbnail Image

Three more firms hit by targeted Phishing attacks seeking W2 data

It's happened again. Scammers have leveraged Phishing to gain access to W2 information at several firms, including technology powerhouse Seagate. No company is immune to these types of social attacks, and organizations both large and small have become victims to a finance-based scheme that has a long reach. Read More

Thumbnail Image

'Serious risk' that Apple-made iPhone cracking code will leak

Security experts warned there is a "serious risk" that the special iPhone-cracking software sought by the FBI would fall into the wrong hands. Read More

Thumbnail Image

Ransomware developers target Apple customers

Over the weekend, Apple customers who were looking for the latest version of Transmission, a popular BitTorrent client, likely downloaded a new family of Ransomware that targets OS X installations instead. Read More

Thumbnail Image

Post-RSA Conference blues? Get ready for a CSO confab!

Security chiefs are heading to the desert next month for cyber attack planning. Read More

Video/Webcast: Ixia

ThreatARMOR - Your New Front Line of Defense

Reduce your attack surface with a security solution that sits in front of other security devices to provide dual-function protections: 1) Blocks traffic from known IP addresses; and 2) Blocks outbound bot communication from pre-existing infections. Read More

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.