Monday, May 23, 2016

Milwaukee Bucks hit by W-2 Phishing attack

Social engineering 101: 18 ways to hack a human [Infographic]

Email not displaying correctly? View it in your browser.

CSO

CSO Security Awareness Weekly

May 23, 2016
Featured Image

Milwaukee Bucks hit by W-2 Phishing attack

Players and staff with the Milwaukee Bucks had their 2015 W-2 records compromised, after a staffer with the NBA franchise released the records to an email address spoofed to appear as if it came from team president Peter Feigin. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Social engineering 101: 18 ways to hack a human [Infographic]
Detecting low and slow insider threats
As the phish, we all need to recognize the baited hook
Keeping humanity in the privacy debate
Basic Phishing scam successfully targets PR agency, reporters

White Paper: Dimension Data

Enabling Transformation to a Digital Enterprise

As enterprise organizations move to adopt digitization, leveraging technologies of the Third Platform, the impact on enterprise networks will be profound as they contend with balancing business and technology forces. More importantly enterprises have concerns with supporting and managing new architectural models and operating practices that new IT workloads require. Read More

Thumbnail Image
INSIDER

Social engineering 101: 18 ways to hack a human [Infographic]

Hackers use these common tactics to prey on your humanity. Here's what you need to know to keep you, your users, and your business safe. Read More

Thumbnail Image

Detecting low and slow insider threats

In my last post I discussed how machine learning could be used to detect phishing-based account compromise attacks using a real-world use case from the recent Verizon Data Breach Digest. This time I'll examine how to detect insider threats using similar techniques. Read More

Thumbnail Image

As the phish, we all need to recognize the baited hook

Phishing scams aren't going away, and the scammers are in fact getting more sophisticated. That means users have to be more cautious than ever. Read More

Thumbnail Image

Keeping humanity in the privacy debate

J. Trevor Hughes, president and CEO of the International Association of Privacy Professionals (IAPP), explores the basic understanding of privacy from solitude to intimacy. Read More

Thumbnail Image

Basic Phishing scam successfully targets PR agency, reporters

On Tuesday evening, Salted Hash received a pitch from a PR agency we've worked with in the past. Such things are normal in the day-to-day life of a journalist. But the problem is, this email wasn't a pitch, it was a Phishing attack with at least three victims - including the PR agency that sent it and the two journalists who forwarded the original message. Read More

White Paper: SanDisk

Cloud Architects Choose Datacenter Flash to Power Industry's Clouds

Cloud architects designing public and private clouds must satisfy business needs while meeting cloud infrastructure scale, performance, and agility requirements. This is why flash technology has become an integral part of storage needs for cloud applications moving forward and will continue to be an important part of data center design in the future. Read More

Top 5 Stories

1. Top 10 ways to retain IT security talent
2. Pornhub said to be compromised, shell access available for $1,000
3. Basic Phishing scam successfully targets PR agency, reporters
4. A hacker is selling 167 million LinkedIn user records
5. Stealthy malware Skimer helps hackers easily steal cash from ATMs

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Security Awareness Weekly as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive