Monday, April 30, 2018

PoC published for BSOD, works on vulnerable Windows boxes even if PC is locked

GDPR-defined personal data can be hard to find—here's where to look

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Apr 30, 2018
Featured Image

PoC published for BSOD, works on vulnerable Windows boxes even if PC is locked

A malware researcher published proof-of-concept code that can trigger the dreaded Blue Screen of Death. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

GDPR-defined personal data can be hard to find—here's where to look
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
Best security software: How 9 cutting-edge tools tackle today's threats
5 signs you've been hit with an advanced persistent threat (APT)
10 minutes of your time and a chance to win $500
The best antivirus? Kaspersky leads in latest tests, but that's only part of the story

White Paper: VMware

Migrating Apps to the Cloud in 5 Steps

Cloud applications, platforms and services are changing the way enterprises compete for customers. The implementation of cloud technology promises business transformation and modernization, while adding product value and meeting the increasingly demanding needs of applications. By developing a sound migration strategy and evaluating your business processes, effective cloud migration can be achieved on-time and on-budget with minimal risk. Read More

Thumbnail Image

GDPR-defined personal data can be hard to find—here's where to look

The General Data Protection Regulation (GDPR) puts the onus on organizations to better manage and personal data. But do they know where to find it? We list the areas most likely to be overlooked. Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

Best security software: How 9 cutting-edge tools tackle today's threats

In these security software reviews, we go hands-on with some of the most innovative, useful and, arguably, best security software from today's most important cybersecurity technology categories. Read More

Thumbnail Image

5 signs you've been hit with an advanced persistent threat (APT)

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack Read More

Thumbnail Image

10 minutes of your time and a chance to win $500

CSO is conducting our annual Security Priorities survey, and we invite you to participate. It will take no more than 10 minutes of your time and you can enter a sweepstakes to win a $500 cash prize. Read More

Thumbnail Image

The best antivirus? Kaspersky leads in latest tests, but that's only part of the story

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, antivirus tools still play an important role in the enterprise security strategy. Read More

White Paper: Palo Alto Networks

10 Things Your Next Firewall Must Do

As the leader and pioneer of the next-generation firewall category, Palo Alto Networks would like to share what we have learned from securing over 3,500 enterprise networks in the past few years. Download our guide that depicts the top 10 requirements you should demand in your next firewall purchase. Read More

CSO Insider

1. 8 hot cyber security trends (and 4 going cold)
2. 14 top tools to assess, implement, and maintain GDPR compliance
3. Microsoft Windows 10 vs. Apple macOS: 18 security features compared
4. 6 use cases for blockchain in security
5. 4 open-source Mitre ATT&CK test tools compared

Editor's Picks

1. Hottest cybersecurity products at RSA 2018
2. The 10 Windows group policy settings you need to get right
3. How to detect and prevent crypto mining malware
4. How to build a cyber security strategy
5. 17 penetration testing tools the pros use
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:04 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive