Metadata wrecks Guccifer 2.0's claims of a Clinton Foundation hack

Email not displaying correctly? View it in your browser.

CSO

CSO Newswatch

Oct 07, 2016
Featured Image

What CSOs can learn from the Yahoo data breach

Kevin O’Brien from GreatHorn chats with CSO about the takeaways for security leaders Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Metadata wrecks Guccifer 2.0's claims of a Clinton Foundation hack
FCC to vote on strict privacy rules for ISPs in late October
Drones could help with disasters like Hurricane Matthew
War stories: Logs are where the dead things dwell
Time to kill security awareness training

White Paper: IBM Corporation

6 Essentials of a Modern B2Bi Architecture

Read this eBook to get insight on the essential elements of a modernized B2B integration architecture. Companies need a strategy as they think about modernizing their B2B integration capabilities. This eBook describes what to look for and how IBM can help. Read More

Thumbnail Image

Metadata wrecks Guccifer 2.0's claims of a Clinton Foundation hack

On Thursday, Scot Terban, a researcher known to many online as Dr. Krypt3ia, shared some forensics results with Salted Hash. After checking with FOCA, the metadata shows the recently leaked documents from Guccifer 2.0 didn't actually come from the Clinton Foundation, they originated at the Democratic Congressional Campaign Committee (DCCC). Read More

Thumbnail Image

FCC to vote on strict privacy rules for ISPs in late October

The U.S. Federal Communications Commission will push forward with controversial privacy regulations that would require broadband providers to get customer permission before using and sharing geolocation, browsing histories, and other personal information. Read More

Thumbnail Image

Drones could help with disasters like Hurricane Matthew

Emergency personnel could use 'flying hot spots' to communicate in remote places where wireless antennas were lost or unavailable. Read More

Thumbnail Image

War stories: Logs are where the dead things dwell

Read More

Thumbnail Image

Time to kill security awareness training

Security awareness is a tired concept and has not worked. It is time to replace it with true education and engagement. Read More

Video/Webcast: IBM Corporation

Blue Shield of California Speeds Cloud Deployment with IBM PureApplication

With their newly robust customer portal, Blue Shield of California now has the ability to grow and shrink on demand, as well as deploy new environments in hours as opposed to days - which greatly improves customer service. Read More

Top 5 Stories

1. Here are the 61 passwords that powered the Mirai IoT botnet
2. These ransomware tricks fool the most hardened security pro
3. Five tips for protecting your brand on social media
4. Android malware that can infiltrate corporate networks is spreading
5. Investment fund loses $6 million in BEC scam, suspends operations

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Newswatch as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.