Sunday, October 25, 2015

DDoS scammers collect $20,000 with Ashley Madison extortion

Chase's tweet backing PIN credit cards was a mistake, bank says.

IDG Contributor Network: Compliant does not equal protected: our false sense of security.

CSO Update
October 25, 2015

DDoS scammers collect $20,000 with Ashley Madison extortion

Since September, Salted Hash has followed the extortion attempts from a group of scammers overseas who are targeting the leaked Ashley Madison email list. Most of the emails threaten exposure, but others threatened DDoS, as well as offered help collecting government aid. READ MORE

Twitter
 

Issue highlights

1. Chase's tweet backing PIN credit cards was a mistake, bank says

2. IDG Contributor Network: Compliant does not equal protected: our false sense of security

3. Boards are getting more involved in cybersecurity, but is it enough?

White Paper: Open Text

Transactional Data: Are You Ready for Customer Demands?

An IDG Research survey reveals that customers want access to their transactional data from any device, any time. Letting customers access and interact with their transactional data from any device is complex. Here are some insights for IT leaders who are ready to create a strategy. Learn More

Chase's tweet backing PIN credit cards was a mistake, bank says

JP Morgan Chase Bank tweeted in error that its chip credit cards would be getting PIN security, a bank spokesman confirmed. READ MORE

White Paper: Sophos Inc

Five Stages of a Web Malware Attack

Today's web attacks are extremely sophisticated and multi-faceted, motivated by a massive underground economy that trades in compromised computers and user information. This paper shows you how modern web attacks work, broken down into five stages, from entry through execution. Learn More

IDG Contributor Network: Compliant does not equal protected: our false sense of security

Having regulatory compliance laws in place helps hold organizations accountable and clearly places the onus on organizations to protect the sensitive data they store. So, with regulatory compliance standards in place, does this translate into healthcare organizations being better protected than those in other industries? Not necessarily. READ MORE

Webcast: IBM

Data Movement at Maximum Speed

If you could move your data anywhere in the world, how would it transform your business? With Aspera, customers can transfer unlimited numbers of files of any size at high speed, predictably and reliably, at long distances, and with complete security. Learn More

Boards are getting more involved in cybersecurity, but is it enough?

Despite operating in a state of hyper vigilance regarding cybersecurity threats, board participation in such planning is at only 45 percent, according to 10,000 executives surveyed by PwC. READ MORE

White Paper: Citrix Systems

Achieve Compliance and Increase Web Application Security

Beginning in January of 2015, all entities that store, process, or transmit cardholder data will be subject to version 3.0 of the Payment Card Industry Data Security Standard (PCI DSS). This white paper examines the prevailing conditions driving evolution of the PCI DSS and the resulting challenges facing today's IT departments. View now

Top 5 Stories

  1. Data dump suggests possible breach at Electronic Arts
  2. 20 of the worst passwords
  3. Facebook warns users of potential state-sponsored attacks
  4. Malware replaces browser with a dangerous Chrome lookalike
  5. Consumer Alert: Debit card fraud at Walmart discovered in 16 states

 

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

 

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:30 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive