Tuesday, April 19, 2016

That man who ‘deleted his entire company’ with a line of code? It was a hoax

Hacker: This is how I broke into Hacking Team

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Apr 19, 2016
Featured Image

That man who 'deleted his entire company' with a line of code? It was a hoax

The owner of a Web hosting company who claimed to have erased his entire business from the web with a single scripting command apparently made the whole thing up. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Hacker: This is how I broke into Hacking Team
Organizations still reporting stolen W-2 information
Schools put on high alert for JBoss ransomware exploit
Apple rebuts DOJ's appeal in N.Y. meth dealer's iPhone case

Video/Webcast: EMA Research

Effective BYOD Management: Empowering a Mobile Workforce

Join Steve Brasen, managing research director of leading IT analyst firm EMA, live May 17th @ 11AM PDT/ 2PM EDT to get key results from recently published survey-based research on BYOD requirements and solutions. Read More

Thumbnail Image

Hacker: This is how I broke into Hacking Team

The hacker who leaked 400GB of internal files and emails from Italian surveillance software maker Hacking Team published a full account of how he infiltrated the company's network. Read More

Thumbnail Image

Organizations still reporting stolen W-2 information

Since the end of 2015, criminals have gone on a rampage targeting W-2 information at organizations both large and small. So far this year, more than sixty organizations have come forward as victims of business email compromise (BEC) scams, including three just last week. Despite today's tax deadline with the IRS, the attacks show little sign of slowing. Read More

Thumbnail Image

Schools put on high alert for JBoss ransomware exploit

More than 2,000 machines at schools and other organizations contain a backdoor in unpatched versions of Red Hat's JBoss enterprise application server software and are ready to be infected by ransomware. Read More

Thumbnail Image

Apple rebuts DOJ's appeal in N.Y. meth dealer's iPhone case

Apple opposed the Department of Justice's renewed demand that it assist investigators in accessing a drug dealer's iPhone, arguing that the government has not proved the company's help is required Read More

Video/Webcast: EMA Research

Making Cybersecurity Manageable with Hi-Fidelity Security

Join David Monahan, from IT analyst firm EMA, and Wade Williamson of Vectra Networks, live May 24th @ 11AM PDT/ 2PM EDT to learn how to implement high-fidelity security to manage today's most challenging threats, efficiently and effectively. Read More

Top 5 Stories

1. MIT's new bug finder uncovers flaws in Web apps in 64 seconds
2. Meet the $100 million cybersecurity startups
3. Apple kills QuickTime for Windows, two vulnerabilities announced
4. 8 of the most unsettling things you'll find on the darknet
5. Ransomware authors use the bitcoin blockchain to deliver encryption keys

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive