Thursday, May 26, 2016

5 active mobile threats spoofing enterprise apps

Five arrested for impersonating the IRS, listen to a recorded scam in progress

Email not displaying correctly? View it in your browser.

CSO

CSO Update

May 26, 2016
Featured Image

5 active mobile threats spoofing enterprise apps

Enterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it spells trouble for IT departments everywhere. Here are 5 apps that masquerade as real apps. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Five arrested for impersonating the IRS, listen to a recorded scam in progress
Do we need vendor allies in the malware arms race?
Cybersecurity recruitment in crisis
Regulators: cybersecurity poses biggest risk to global financial system
Top-level domain expansion is a security risk for business computers
The frustrating aftermath of a data breach at American Type Culture Collection

White Paper: Okta

A New World Order for IT

IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors. Read More

Thumbnail Image

Five arrested for impersonating the IRS, listen to a recorded scam in progress

Five people have been arrested in Miami who are said to be responsible for scamming 1,500 people out of more than $2 million by impersonating IRS agents. Their scams centered on contacting individual taxpayers out of the blue and demanding payments under the threat of jail time. Read More

Thumbnail Image

Do we need vendor allies in the malware arms race?

The complexity of today's SOC functions means you probably can't hire and keep a staff with all the necessary training. Read More

Thumbnail Image

Cybersecurity recruitment in crisis

Globally cybersecurity is in crisis not solely from a lack of skilled personnel, but also from a lack of strategic direction and company's inability to hire staff in an expedient, effective and efficient manner. Read More

Thumbnail Image

Regulators: cybersecurity poses biggest risk to global financial system

Last week, the chair of the Securities and Exchange Commission called cybersecurity the biggest risk facing the global financial industry. The SEC promises to step up regulation and Swift itself is expected to launch a new cyber security initiative this week that includes independent security audits of its customers. Read More

Thumbnail Image

Top-level domain expansion is a security risk for business computers

The explosion of new generic top-level domains (gTLDs) in recent years can put enterprise computers at risk due to name conflicts between internal domain names used inside corporate networks and domains that can now be registered on the public Internet. Read More

Thumbnail Image

The frustrating aftermath of a data breach at American Type Culture Collection

In April, American Type Culture Collection (ATCC) was targeted by a Phishing attack seeking W-2 records. The attempt was successful, leaving employees stressed about their finances and the long-term impact this breach could have on them. But it's the actions by the company after the incident that's left some employees feeling as if ATCC's leadership stopped caring. Read More

White Paper: Riverbed Technology

Application Performance Optimization: Tackling the Challenges of a Remote and Mobile Workforce

More than half of today's enterprise workforce transitions between the office and working remotely. Supporting this increasingly remote and mobile workforce puts significant pressure on IT teams to deliver seamless connectivity and superior application performance to any location. Read More

Top 5 Stories

1. More options to defeat ransomware
2. A recently patched Flash Player exploit is being used in widespread attacks
3. Milwaukee Bucks hit by W-2 Phishing attack
4. How to avoid phishing attacks
5. Why CISO is the hardest tech role to fill

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive