Wednesday, May 2, 2018

Online voting is impossible to secure. So why are some governments using it?

North Korean anti-virus uses old Trend Micro components

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

May 02, 2018
Featured Image

Online voting is impossible to secure. So why are some governments using it?

If you thought electronic voting machines were insecure, wait 'til you meet online voting. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

North Korean anti-virus uses old Trend Micro components
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
Car hackers find remotely exploitable vulnerabilities in Volkswagen and Audi vehicles
10 minutes of your time and a chance to win $500
DOD releases new guidance giving teeth to cybersecurity rules to protect data within the supply chain
Salted Hash Ep 24: Defending against mobile threats

Video/Webcast: OpenText

Achieve Real-Time Visibility Across Your Supply Chain

Watch the video to learn how Procure-to-Pay (P2P) solutions automate B2B processes to help you gain better visibility into transaction lifecycles, improve efficiency, and increase the speed and accuracy of order, shipping, and invoice processing. Read More

Thumbnail Image

North Korean anti-virus uses old Trend Micro components

Researchers at Checkpoint have published a report showing that North Korea's SiliVaccine, the country's anti-virus product, uses functional elements taken from a ten-year-old copy of Trend Micro's anti-virus. Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

Car hackers find remotely exploitable vulnerabilities in Volkswagen and Audi vehicles

Researchers discovered flaws in the Audi A3 Sportback e-tron and the Volkswagen Golf GTE that make the vehicles vulnerable to remote hacking. Read More

Thumbnail Image

10 minutes of your time and a chance to win $500

CSO is conducting our annual Security Priorities survey, and we invite you to participate. It will take no more than 10 minutes of your time and you can enter a sweepstakes to win a $500 cash prize. Read More

Thumbnail Image

DOD releases new guidance giving teeth to cybersecurity rules to protect data within the supply chain

Companies supplying products and services to the US Department of Defense must meet 110 security requirements specified in NIST SP 800-171 or risk losing contract awards through a new set of risk scoring guidelines. The new rules demonstrate the government's determination to insist on strong cybersecurity practices among its business partners and drive compliance. Read More

Thumbnail Image

Salted Hash Ep 24: Defending against mobile threats

Welcome back! After shooting several episodes during the RSA Conference in San Francisco, this week Salted Hash talks mobile threats with VASCO's Will LaSala. In addition to this week's episode, we've also got some additional footage from the conference. Read More

White Paper: Jamf

A Comprehensive Guide: Apple Device Management for Beginners

While some are very familiar with Apple already, many of you are diving into Apple device management for the first time. This guide is for the latter, and will help you build and master your Apple management skills. Read More

CSO Insider

1. 8 hot cyber security trends (and 4 going cold)
2. 14 top tools to assess, implement, and maintain GDPR compliance
3. Microsoft Windows 10 vs. Apple macOS: 18 security features compared
4. 6 use cases for blockchain in security
5. 4 open-source Mitre ATT&CK test tools compared

Editor's Picks

1. Hottest cybersecurity products at RSA 2018
2. The 10 Windows group policy settings you need to get right
3. How to detect and prevent crypto mining malware
4. How to build a cyber security strategy
5. 17 penetration testing tools the pros use
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:04 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive