Tuesday, December 1, 2015

Just in time for the holidays: Most hackable devices

VTech data breach should serve as a warning for parents

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Dec 01, 2015
Featured Image

Just in time for the holidays: Most hackable devices

Many holiday gifts purchased this season are likely to be connected devices, including smart TVs, tablets, smartphones, notebooks and laptops, and video game consoles. Unfortunately, many of these devices will make homes more vulnerable to hackers. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

VTech data breach should serve as a warning for parents
Welcome to the Internet of stupid (hackable) things
Tis the season…of malware

White Paper: Dell Inc

Building an Enterprise Storage Architecture: What's In It for You?

Storage is becoming more difficult for organizations to manage - learn how a unifying storage architecture can help. Read More

Thumbnail Image

VTech data breach should serve as a warning for parents

Over the weekend, as families gathered for Thanksgiving and shoppers prepared for Black Friday, Hong Kong-based toy maker VTech confirmed that their Learning Lodge app store database had been compromised. Read More

Thumbnail Image

Welcome to the Internet of stupid (hackable) things

The rise of IoT technology brings with it the promise of innovation the likes of which we've never seen. But the reality of everything being connected can have unintended consequences, not all of them useful. Read More

Thumbnail Image

Tis the season…of malware

Every year cybercriminals find the time to give out holiday malware. It is their way of giving back to the community, so instead of look out for these pieces of malware coal. Read More

eBook: Iron Mountain

eBook: Elevate Data Backup

This e-Book shows you how to eliminate tape based backups, and move to cloud data replication - all while leveraging your existing infrastructure in Data Domain or Avamar. Read More

Top 5 Stories

1. This gizmo knows your Amex card number before you've received it
2. Infosec jobs: Use keywords to boost your LinkedIn ranking
3. 8 penetration testing tools that will do the job
4. 10 Tough Security Interview Questions, and How to Answer Them
5. Tis the season…of malware

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2015 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive