How to tell if Pokemon Go is malware

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Feb 03, 2017
Featured Image

WordPress silently fixes dangerous code injection vulnerability

Developers of the widely used WordPress content management system intentionally delayed announcing that a recent patch fixed a severe vulnerability. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to tell if Pokemon Go is malware
33% off CanaKit 5V 2.5A Raspberry Pi 3 Power Supply / Adapter / Charger - Deal Alert
Cisco patches critical flaw in Prime Home device management server
RSA 2017: The Internet of Things security threat
Obama-led sanction accidentally hampered U.S. tech firms in Russia

White Paper: Leidos

4 Challenges Facing Every Security Operations Center Manager

A comprehensive look at the top four challenges facing your security operations is the first step to mitigating them. Why not approach them as opportunities to strengthen your cybersecurity posture and better protect your assets! This white paper discusses the universal challenges facing every SOC: Resource allocation, Threat alert management, Vendor dependencies, Intelligence standardization Read More

Thumbnail Image

How to tell if Pokemon Go is malware

Mobile security company Zimperium is putting out the alert to make sure users are cognizant of these apps when they head into app stores. Read More

Thumbnail Image
DealPost

33% off CanaKit 5V 2.5A Raspberry Pi 3 Power Supply / Adapter / Charger - Deal Alert

The CanaKit 2.5A Raspberry Pi power supply / adapter has been specially designed and tested for the new Raspberry Pi 3 and incorporates an inline noise filter for highest stability and reliable operation. Read More

Thumbnail Image

Cisco patches critical flaw in Prime Home device management server

Cisco Systems has fixed a critical vulnerability that could allow hackers to take over servers used by telecommunications providers to remotely manage customer equipment such as routers. Read More

Thumbnail Image

RSA 2017: The Internet of Things security threat

RSA Conference 2017 will take on the threat posed by the internet of things, something that was demonstrated last fall by the DDoS attacks that took down Dyn data centers and many of the high-profile Websites it supports. Read More

Thumbnail Image

Obama-led sanction accidentally hampered U.S. tech firms in Russia

Sanctions imposed by former President Obama on Russia for hacking during the U.S. election had an unintended side effect: they essentially barred U.S. tech firms from selling new IT products in the country. Read More

White Paper: Leidos

5 Steps to Develop a Successful Insider Threat Detection Program

A comprehensive look into how organizations can develop and implement a successful insider threat detection program. This white paper outlines the five steps to success: Gain Leadership Support, Leverage the Latest Technology, Develop a Communications Plan, Execute a Training and Awareness Campaign, Establish a Governance Structure Read More

Top 5 Stories

1. Details on 200,000 racing fans exposed by IndyCar
2. BMongoDB ransom attacks continue to plague administrators
3. How to eliminate insider threats
4. SonicWall CEO talks of life after Dell spinout
5. Dozens of Netgear products vulnerable to authentication bypass flaws

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.