Tuesday, October 6, 2015

9 ways to be tech-ready for the next hurricane

Security risks increase as cloud data centers change.

Encrypted Flash exploit bypassing vector mitigations.

CSO After Dark
October 06, 2015

9 ways to be tech-ready for the next hurricane

With Hurricane Joaquin stirring up high winds and rain off the East Coast, FEMA has released a set of guidelines that might help you stay connected and keep your systems operational once the storm hits. READ MORE

Twitter
 

Issue highlights

1. INSIDER Security risks increase as cloud data centers change

2. Encrypted Flash exploit bypassing vector mitigations

3. IP camera makers pressure researcher to cancel security talk

4. Google patches second round of Stagefright flaws in Android

5. Chinese hackers put iOS in the crosshairs with novel attack angles

White Paper: LogRhythm

Surface Cyber Threats via Security Intelligence

The Security Intelligence Maturity Model™ (SIMM) provides a systematic guide for an organization to assess and actively achieve a heightened security posture. Find out where your organization sits on the SIMM and identify gaps that need to be filled. Learn More

INSIDER

Security risks increase as cloud data centers change

Change is always risky. Fast change is even riskier, leaving less time for change management and checks on changed technologies. READ MORE

Encrypted Flash exploit bypassing vector mitigations

Researchers at Morphisec, have discovered a clever bypass being used by the Nuclear exploit kit when it targets CVE-2015-5560. READ MORE

IP camera makers pressure researcher to cancel security talk

An upcoming talk covering security problems in Internet-connected cameras has been canceled after opposition from some manufacturers. READ MORE

Google patches second round of Stagefright flaws in Android

Google has issued patches for two new Stagefright-related software vulnerabilities, one of which affects Android versions going back to 2008 and puts millions of users at risk. READ MORE

Chinese hackers put iOS in the crosshairs with novel attack angles

For nearly a year, Chinese hackers have used a novel one-two punch to compromise iOS devices. READ MORE

White Paper: LifeLock

After a Breach the Most Important Thing to Preserve is Trust

When you experience a security breach, you lose customer data, business, and most importantly your customers' trust. Choose LifeLock and you'll go beyond mere credit monitoring to proactively protect your customers - and restore trust. Learn More

Follow CSO Online

You are currently subscribed to cso_after_dark as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:00 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive