Sunday, May 31, 2015

11 software bugs that took way too long to meet their maker

Seven things government security leaders expect vendors to address.

Like routers, most USB modems also vulnerable to drive-by hacking.

CSO Update
May 31, 2015

11 software bugs that took way too long to meet their maker

All software has bugs, but even the most well known applications can have errors and vulnerabilities that somehow go undetected for years - or decades. READ MORE

Twitter
 

Issue highlights

1. Seven things government security leaders expect vendors to address

2. Like routers, most USB modems also vulnerable to drive-by hacking

3. Red Bull scam will give your bank account wings

4. INSIDER Best practices for email security

5. What enterprise should do when helpless employees lose hope in fighting cyber attacks

Webcast: Oracle

Insight into Governance, Risk & Compliance Programs

Join us on Wednesday, May 6 at 2:00 p.m. EST for a live discussion with industry experts. Learn More

Seven things government security leaders expect vendors to address

What do government executives often think, but not share openly with their private sector partners? What traps to security companies of all sizes land in while trying to sell to the government market? Here are a few items that public sector executives expect vendors to know. READ MORE

White Paper: Unitrends

Backing Up With Doctor Who: 12 Reasons For 12 Doctors

Doctor Who — television's great traveler through space and time — might be the ultimate backup specialist. He can recover from just about any disaster simply by regenerating himself. While each incarnation of the Doctor is different from the last, each brings something new to the table. Learn More.

Like routers, most USB modems also vulnerable to drive-by hacking

Attackers can hijack DNS settings by exploiting vulnerabilities in the Web-based management interfaces of 3G/4G USB modems READ MORE

White Paper: Unitrends

7 Shortcuts to Losing Your Data (and Probably Your Job!)

This tongue-in-cheek white paper explores data loss from a contrarian point of view - exploring the top 7 shortcuts you can take to ensure that you lose your data. Read Now

Red Bull scam will give your bank account wings

A scam email making the rounds offers to pay you to drive a Red Bull-decal adorned car. Sounds too good to be true? That's because it is READ MORE

INSIDER

Best practices for email security

6 ways to tighten up email policies and improve network security. READ MORE

What enterprise should do when helpless employees lose hope in fighting cyber attacks

CSO looks at the symptoms of the victim mentality in the enterprise, how it comes about, and what enterprises can do technically and psychologically to avoid it. READ MORE

White Paper: BMC Software

A Call To Action To Automate Breach Response

Discover how to quickly remediate aggressive security threats. Read this report from Forrester Research and see how new automated compliance processes will reduce your organization's risk. Learn More

Top 5 Stories

  1. Adult Friend Finder confirms data breach 3.5 million records exposed
  2. The human cost of the Adult Friend Finder data breach
  3. CareFirst breach demonstrates how assumptions hurt healthcare
  4. Is security really stuck in the Dark Ages?
  5. Millions of records compromised in these data breaches

 

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

 

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:30 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive