CSO

CSO Daily

October 07, 2019

Image: Zero-day vulnerability gives attackers full control of Android phones

Zero-day vulnerability gives attackers full control of Android phones

Attackers are reportedly exploiting an unpatched vulnerability to take control of Android devices and potentially deliver spyware. The flaw affects phones models from multiple manufacturers including Google, Samsung, Huawei, LG and Xiaomi. Read more ▶

Your Must-Read Stories

•

Justice Department takes another run at encryption backdoors with ‘lawful access’

•

7 ways 5G mobile networks will change IoT security, and how to prepare

•

Directory traversal explained: Definition, examples and prevention

•

Philips and HPE: Healthcare Innovation From the Edge to the Cloud

•

How to protect and safely erase data on Windows devices

•

8 ways your patch management policy is broken (and how to fix it)

Video/Webcast: Box

Why ECM Doesn’t Cut It Anymore

As organizations race toward digital transformation, they’re still using a patchwork of legacy ECM systems and basic file-sharing tools. These systems can't keep up with the way business works today — and they can't deliver the security, governance and compliance you need. Read more ▶

Image: Justice Department takes another run at encryption backdoors with ‘lawful access’

Justice Department takes another run at encryption backdoors with ‘lawful access’

Law enforcement officials and experts on the distribution of child pornography gathered on Friday to make the emotional, if not technological, case that tech companies should open up their encryption schemes to police investigating crimes. Read more ▶

Image: Arcadia Power Can Help You Go Green & Lower Your Power Bill

DEALPOST

Arcadia Power Can Help You Go Green & Lower Your Power Bill

Read more ▶

Image: 7 ways 5G mobile networks will change IoT security, and how to prepare

7 ways 5G mobile networks will change IoT security, and how to prepare

Every internet of things security issue will be greatly magnified in a 5G environment. Address these seven areas before you deploy your own. Read more ▶

 
 
Image: Directory traversal explained: Definition, examples and prevention

Directory traversal explained: Definition, examples and prevention

In a path traversal attack, also known as directory traversal, an attacker enters information in a web form, URL address line, or another input method that gives them access to a file or directory that they shouldn't have access to. Jira is just the most recent company to expose its customers via a path traversal vulnerability. This risk is easily avoidable, but developers keep making the same mistake. Read more ▶

BrandPost Sponsored by HPE

Philips and HPE: Healthcare Innovation From the Edge to the Cloud

Philips and HPE: Healthcare innovation from the edge to the cloud Read more ▶

Image: How to protect and safely erase data on Windows devices

How to protect and safely erase data on Windows devices

Microsoft's BitLocker now uses AES encryption, but will default to the storage device's hardware encryption unless you make this setting, which will also allow you to easily sanitize drives. Read more ▶

Image: 8 ways your patch management policy is broken (and how to fix it)

8 ways your patch management policy is broken (and how to fix it)

These eight patching best practices mistakes get in the way of effective risk mitigation. Here's how to fix them. Read more ▶

White Paper: Ixia, A Keysight Business

Edge Computing: Four Smart Strategies for Safeguarding Security and User Experience

Discover four smart strategies to boost your security and capture dynamic network intelligence from your network’s edge. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.