Big Brother is listening as well as watching

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jul 04, 2016
Featured Image

What security pros can learn from the networking team

In truth, your security team has a lot to learn from the networking team about how to keep the whole organization running smoothly. We spoke to networking experts to find out what they most wanted security pros to know. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Big Brother is listening as well as watching
Hackers are coming for your healthcare records -- here’s why
This mobile Trojan from China fills your phone with porn apps
Industry veterans launch security advisory firm

White Paper: Imperva

2016 Cyberthreat Defense Report

Read the new 2016 Cyberthreat Defense Report and find out how 1000 IT security decision makers defend against today's internal and external threats. Read More

Thumbnail Image

Big Brother is listening as well as watching

The professed goal of audio surveillance on mass transit systems may be to protect passengers. But privacy advocates say it crosses a line, amounting to violations of free speech and the right to be free from unwarranted and ‘unreasonable’ searches. Read More

Thumbnail Image

Hackers are coming for your healthcare records -- here’s why

Because patient information can be so lucrative, healthcare organizations and insurance companies are being targeted by hackers and should expect to eventually suffer a security breach. Read More

Thumbnail Image

This mobile Trojan from China fills your phone with porn apps

Malware that secretly installs porn apps on your phone is infecting devices by the millions, becoming the world’s largest mobile Trojan. Read More

Thumbnail Image

Industry veterans launch security advisory firm

Jonathan Steenland, former CISO at Fujitsu, and Richard Dorough, former Senior Managing Director of PwC’s Cyber Breach Response Practice and former Global CISO at Textron co-lead Zyston's CISO Advisory Services. Read More

eBook: Sqrrl

Cyber Threat Hunting eBook: What Security Execs Need To Know

Cyber threat hunting is the proactive, iterative search for advanced cyber threats that have evaded your other defenses. In this ebook you will learn about threat hunting benefits, frameworks, and best practices. Read More

Top 5 Stories

1. Dangerous keyboard app has more than 50 million downloads
2. This malware pretends to be WhatsApp, Uber and Google Play
3. 11 ways to fight off ransomware
4. Account security: moving past the password
5. Hard Rock Las Vegas suffers a second data breach

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.