Monday, July 25, 2016

Hackers create Safe Skies TSA master key from scratch, release designs

This Tinder scam promises to verify your account, but actually sells porn

Email not displaying correctly? View it in your browser.

CSO

CSO Security Awareness Weekly

Jul 25, 2016
Featured Image

Hackers create Safe Skies TSA master key from scratch, release designs

On Saturday evening, during the Eleventh HOPE conference in New York City, three hackers released the final master key used by the Transportation Security Administration (TSA), which opens Safe Skies luggage locks. The public release of this eighth and final key has once again exposed the problems created by key escrow. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

This Tinder scam promises to verify your account, but actually sells porn
Security Sessions: Protecting data when it's increasingly mobile
A hackable election: 5 things you need to know about e-voting machines
Pokemon Go: What security awareness programs should be doing now

Video/Webcast: Veritas

A Revolutionary Approach to Oracle Backup

If your organization uses native database tools, like RMAN, to backup your Oracle databases, you're not alone (82% of Oracle DBs are primarily managed by DBAs). While these tools are simple and convenient, they can create management, scheduling, and governance challenges that put your database team at odds with the backup team and with corporate compliance. Read More

Thumbnail Image

This Tinder scam promises to verify your account, but actually sells porn

Tinder users beware. The popular dating app generally doesn't verify user accounts, but that hasn't stopped spammers from pretending to offer the service. Read More

Thumbnail Image

Security Sessions: Protecting data when it's increasingly mobile

Brett Hansen from Dell Security Solutions joins CSO to discuss data protection when employees and business partners are increasingly mobile Read More

Thumbnail Image

A hackable election: 5 things you need to know about e-voting machines

As the U.S. heads toward a contentious national election in November, 15 states are are still clinging to outdated electronic voting machines that don't support paper printouts used to audit their internal vote counts. Read More

Thumbnail Image

Pokemon Go: What security awareness programs should be doing now

Pokemon Go represents a tremendous security threat. As with all tremendous threats, it can also be your greatest opportunity. Read More

White Paper: IBM Corporation

12 Reasons You Don't Need to Monitor Your Apps

Still wondering what all the application monitoring hype is about? Read more to find out all the reasons why you still don't need to monitor your apps, no matter what everyone else says! Read More

Top 5 Stories

1. Experts say Pokémon Go exposes players to security and privacy risks
2. Vicious new ransomware takes your money and still deletes your files
3. Apple devices held for ransom, rumors claim 40M iCloud accounts hacked
4. Killing the password: FIDO says long journey will be worth it
5. Market expansion adds to cybersecurity talent

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Security Awareness Weekly as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive