Monday, June 27, 2016

Broken Phishing scam targets several tech journalists

Steps to take today to reduce the risk when people leave tomorrow

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Jun 27, 2016
Featured Image

Broken Phishing scam targets several tech journalists

On Saturday, Salted Hash received a Phishing email from a PR contact (the second one this year) that was targeting corporate credentials. Unlike the previous Phishing email received from a professional contact, this one was poorly implemented and broken. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Steps to take today to reduce the risk when people leave tomorrow
5 reasons why academica needs to rebrand hacking
Brexit shows Cameron the gate. You won't believe what happens next. 
Gartner's top 10 security predictions
Report: Security teams plagued by poorly managed identity data

White Paper: Hewlett Packard Enterprise

451 Research: Accelerating the Adoption of Multi-Cloud Strategy

The adoption of public, private and hybrid cloud is rapidly expanding. As IT evolves from productivity enhancer to transformative business differentiator, and as organizations embrace new models of IT consumption, the role of enterprise IT departments is changing. Forward-looking IT groups are becoming internal service brokers to their organizations and they are adopting a multi-cloud approach to enable an IT-as-a-service model. Read More

Thumbnail Image

Steps to take today to reduce the risk when people leave tomorrow

Mike Tierney is back with a plan of action for security leaders on protecting company information Read More

Thumbnail Image

5 reasons why academica needs to rebrand hacking

If IT and Computer Science students learn the ins and outs from both sides of hacking, will they be better defenders? Read More

Thumbnail Image

Brexit shows Cameron the gate. You won't believe what happens next. 

Read More

Thumbnail Image

Gartner's top 10 security predictions

Gartner has taken a look at five key areas of security concern that businesses face this year and issued predictions on and recommendations about protecting networks and data from threats that will likely arise in each. Read More

Thumbnail Image
INSIDER

Report: Security teams plagued by poorly managed identity data

Security teams handling Identity and access management (IAM) are hampered by dirty data and need data-cleansing help from a chief data officer, according to TechVision Research. To learn more, download the free report "Getting Your Identity Data Right." Read More

Video/Webcast: EMA

Application Performance Management in the Digital Economy

The latest research on application performance management (APM) from leading IT analyst firm Enterprise Management Associates (EMA) is a deep dive into the trends and requirements driving investments in APM solutions and the outcomes companies experience when such solutions are put in place. Join us July 14th @ 1PM PDT or 4PM EDT. Read More

Top 5 Stories

1. Internet trolls hack popular YouTube channel WatchMojo
2. LinkedIn data breach blamed for multiple secondary compromises
3. This Android malware can secretly root your phone and install programs
4. Take these security books with you on vacation
5. How to prepare for (and prevent) ransomware attacks

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 2:00 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive