Monday, February 22, 2016

uKnowKids.com database error exposed sensitive information on 1,700 kids

The rise of LinkedIn fraud

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Feb 22, 2016
Featured Image

uKnowKids.com database error exposed sensitive information on 1,700 kids

On Monday, it was disclosed that uKnowKids.com, a company in Arlington, Virginia that helps parents monitor their child's activities online, had a misconfigured database that left sensitive details about the children being monitored exposed for months. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The rise of LinkedIn fraud
Proper device management could have prevented the whole FBI-Apple fight
Retaining security talent by embracing distributed team management

White Paper: CrowdStrike

5 Reasons Endpoint Security Must Move to the Cloud

Learn how the Cloud makes it possible to regain unprecedented control over endpoints while detecting, preventing, and responding to attacks in a way that far surpasses on-premise architectures. Read More

Thumbnail Image

The rise of LinkedIn fraud

LinkedIn is among the most popular and profitable social media networks in the world. The platform hosts nearly half a billion users globally, many of whom who pay for subscriptions and features, proving the value of a globally recognized professionals' resource. There is, however, an increasing number of fraudsters and hackers who are committing cybercrimes targeting LinkedIn users. Read More

Thumbnail Image

Proper device management could have prevented the whole FBI-Apple fight

Even without a comprehensive policy, just enrolling the device in an MDM system would have been enough. Read More

Thumbnail Image

Retaining security talent by embracing distributed team management

Ask anyone in a security leadership role about their team and you'll likely find that the great majority are struggling. They are struggling because finding security talent is increasingly hard and keeping that talent is even harder. This is one of the key reasons many organizations are embracing a distributed security team model. Read More

White Paper: CrowdStrike

Beyond Malware: Detecting the Undetectable

60% of attacks don't use malware, creating a big blind spot for conventional malware-based defenses. Learn how next-generation endpoint protection stops sophisticated malware-free attacks. Read More

Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 3:16 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive