Monday, August 22, 2016

One smart plug isn't so bright when it comes to security

10 year-old teaches hackers a valuable lesson in privacy

Email not displaying correctly? View it in your browser.

CSO

CSO Security Awareness Weekly

Aug 22, 2016
Featured Image

One smart plug isn't so bright when it comes to security

Smart sockets that let you control an electrical plug over the Internet may sound cutting edge, but they can also be rife with security flaws. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

10 year-old teaches hackers a valuable lesson in privacy
How IT can limit the risk of popular messaging apps
Why a security team embraces shadow IT

Video/Webcast: Intuit

30 Days to Complete Business Process Visibility

You cant fix what you can't measure. That's why achieving total visibility into your company's processes -- both on their own and all together -- is the key to business growth.Join Steven Bonacorsi, President at the International Standard for Lean Six Sigma (ISLSS), along with Adam Hoover and Sean MacPherson of QuickBase, for this exclusive on-demand webinar. Read More

Thumbnail Image

10 year-old teaches hackers a valuable lesson in privacy

Evan Robertson, age 10, took a science fair project and turned it into a valuable lesson in privacy earlier this month at rootz Asylum, a kids-only gathering at DEF CON where children can learn about security in a safe, encouraging environment. Read More

Thumbnail Image

How IT can limit the risk of popular messaging apps

CIOs have battled shadow IT for years, long before the advent of messaging apps such as WhatsApp and Facebook Messenger. Here's how a set of IT pros makes the most of the latest challenge. Read More

Thumbnail Image

Why a security team embraces shadow IT

A group within Western Union information security team relies on cloud software, including content management, social collaboration and single sign-on tools to let employees to get their work done while protecting corporate data. Read More

White Paper: CA Technologies

Addressing PCI Compliance: Through Privileged Access Management

Organizations handling transactions involving credit or debit cards are facing increasing pressure to meet regulatory compliance mandates. In particular, they must comply with the Payment Card Industry Data Security Standard (PCI DSS) version 3, which went into effect in January of 2015.1 PCI DSS v3 established various requirements for safeguarding an organization's relevant systems and networks, comprising the Cardholder Data Environment (CDE). Read More

Top 5 Stories

1. 8 of the most unsettling things you'll find on the darknet
2. 8 penetration testing tools that will do the job
3. Money talks: Send your kid to cybersecurity school
4. 3 Simple Steps to Hack a Smartphone (Includes Video)
5. The 15 worst data security breaches of the 21st Century

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Security Awareness Weekly as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive