What I learned playing prey to Windows scammers

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jul 10, 2016
Featured Image

What cloud security challenges keep CISOs up at night?

With the network perimeter wide open, see what chief security officers can do to keep everything secure? Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What I learned playing prey to Windows scammers
Security Recruiter Directory
Mitigating insider threats - a technical perspective
4 tools for managing firewall rules
The enterprise is in an arm's race with cybercriminals

White Paper: Kony Inc

10 Key Criteria for Mobile Platform Selection

By taking a holistic approach to app development - as well as platform vendor selection - organizations of any size can achieve more control, predictability and speed. We hope this checklist gets shared, printed and referenced by anyone who is faced with the complexity of enterprise mobility - from designers and developers to line-of-business leads and CXOs. Read More

Thumbnail Image

What I learned playing prey to Windows scammers

Three months of phone calls prove Windows scammers are more skilled at social engineering than you think Read More

Thumbnail Image

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop. Read More

Thumbnail Image

Mitigating insider threats - a technical perspective

Security practitioners must always think dynamically when it comes to trying to develop solutions to counter this threat. Implementing technology solutions at different levels and overlapping functions will best cast a tight-weave security net to catch suspicious behavior prior to a major security incident. Read More

Thumbnail Image
INSIDER

4 tools for managing firewall rules

Poorly managed firewall rules can lead to security disasters. Here, security managers in the IT Central Station community review the top firewall management suites: Tufin, AlgoSec, FireMon and RedSeal. Read More

Thumbnail Image

The enterprise is in an arm's race with cybercriminals

CSO explores the deep web, dwell time, and their roles in the balance of power in cybersecurity, pointing up defensive moves such as employing hackers and improving the effectiveness of employee education about social engineering / phishing in order to better arm personnel. Read More

White Paper: Hedvig Inc.

2016 Predictions For Cloud & What I&O Pros Should Do About Them

This report by Forrester outlines 11 factors that will accelerate cloud adoption in 2016. Read More

Top 5 Stories

1. What I learned playing prey to Windows scammers
2. Court decision raises issues about sharing passwords
3. Apple devices held for ransom, rumors claim 40M iCloud accounts hacked
4. What security pros can learn from the networking team
5. Google fixes over 100 flaws in Android, many in chips

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.