10 biggest hacks of user data in 2016

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Dec 21, 2016
Featured Image

What 2017 has in store for cybersecurity

There is much uncertainty surrounding the security industry for 2017. Many of the trepidations of experts in the field are directly connected to what the nation’s next president will do. Find out what else worries them. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

10 biggest hacks of user data in 2016
10% off Oster Cordless Electric Wine Bottle Opener with Foil Cutter - Deal Alert
IDG Editors predict tech trends for 2017
Review: Threat hunting turns the tables on attackers
Medical data: Accessible and irresistible for cyber criminals
AAA security among 5 enterprise technologies that will shake things up in 2017
Accepting the risk requires more than doing nothing

White Paper: Fortinet, Inc.

Advanced Threats, Advanced Solutions: Integrating a Sandbox Into Your Infrastructure

The volume of threats is increasing, and cybercriminals are enhancing their techniques every day. Companies struggle to proactively see the threats that are coming, knowing when they have been breached and reacting quickly to minimize the threat. Download this whitepaper to learn about 12 different advanced malware techniques being used today and how sandboxing is an incredible tool that can help. Read More

Thumbnail Image
INSIDER

10 biggest hacks of user data in 2016

You take great pains to come up with a strong password when registering for an account on a website -- only to see your efforts go for naught when that site gets hacked. Several sites had their databases of user accounts not only breached but stolen this year, which include the necessary information for logins (i.e. username, password). The following sites are ranked starting at the fewest number of user accounts with passwords that were taken. Read More

Thumbnail Image
DealPost

10% off Oster Cordless Electric Wine Bottle Opener with Foil Cutter - Deal Alert

This cordless electric wine opener from Oster removes the cork in seconds with one-button operation, and opens up to 30 bottles before needing to be recharged. It features a foil cutter for easily removing seals and a comfortable soft-grip handle. Currently discounted 10% on Amazon. Read More

Thumbnail Image
Video

IDG Editors predict tech trends for 2017

Top editors from IDG Enterprise brands Computerworld, Network World, CIO and CSO chime in with their thoughts and predictions for enterprise technology trends in the upcoming year. From Apple to VR, we've got thoughts on what will be hot in 2017. Watch Now

Thumbnail Image
INSIDER

Review: Threat hunting turns the tables on attackers

For this review, we tested threat hunting systems from Sqrrl, Endgame and Infocyte. Each program was tested in a large demo environment seeded with realistic APT threats which had bypassed perimeter defenses and were hiding somewhere within the network of virtualized clients and servers. Read More

Thumbnail Image

Medical data: Accessible and irresistible for cyber criminals

Health care data may not fetch the highest price on every Dark Web marketplace. But it remains one of the most popular targets for cyber criminals, in part because it is easy to get and retains its value. You can’t change a Social Security number the way you can a credit card account. Read More

Thumbnail Image

AAA security among 5 enterprise technologies that will shake things up in 2017

You think you have your hands full as an IT pro now? Just wait until blockchain, IoT, augmented and virtual reality, and these other technologies really start to take hold in 2017. Read More

Thumbnail Image

Accepting the risk requires more than doing nothing

It's not enough to accept the risk by doing nothing. Getting everyone to sign an agreed upon analysis that justifies accepting the risk is key to optimizing risk decisions and protecting both the organization and the risk management professional. Read More

White Paper: Fortinet, Inc.

Best Practices in Network Segmentation for Security

With the rise of BYOD, cloud-based services, and IoT, network boundaries are expanding and becoming increasingly difficult to secure. The enterprise perimeter is often penetrated and once inside, malware can move through the network, launching a devastating attack. In this research note by Gartner, learn how to implement better network segmentation to reduce or eliminate threats from spreading throughout your network. Read More

Top 5 Stories

1. Switch from Yahoo Mail to Gmail, and turn your phone into a physical key
2. What 2017 has in store for cybersecurity
3. Top 15 security predictions for 2017
4. 14 eyebrow-raising things Google knows about you
5. Phishing email scams 108 government employees, 756,000 people affected by breach

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.