Tuesday, August 2, 2016

This tiny device can infect point-of-sale systems and unlock hotel rooms

Black Hat basics: Ruminations on 19 years of Black Hat Briefings

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Aug 02, 2016
Featured Image

This tiny device can infect point-of-sale systems and unlock hotel rooms

Millions of point-of-sale systems and hotel room locks can be hacked by temporarily placing a small, inexpensive device several inches away from their card readers. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Black Hat basics: Ruminations on 19 years of Black Hat Briefings
The Ultimate PC Bundle - Save Hundreds on 10 Top-Rated Apps Ft. Scrivener & CCleaner Pro - Deal Alert
What your cyber risk profile tells insurers
Why you need a strong authentication platform
Kill a smartphone password with a scan of your eye
How to best vet third-party vendors
200M Yahoo accounts go up for sale on digital black market

White Paper: 8x8 Inc

5 Reasons Why You Should Ditch It for the Cloud

Your traditional PBX has served you well. In all likelihood, it's already paid for. So you have a certain incentive to stick with it. That may seem like a safe choice on the surface. After all, changing your communications system is a significant undertaking and entails a certain amount of risk. However, it may be far riskier to stay with an out-of-date and under performing on-premises PBX. Read More

Thumbnail Image

Black Hat basics: Ruminations on 19 years of Black Hat Briefings

As this is my first venture into the world of blogs for CSO, the timing coincides with one of my favorite summer activities—traveling each August to the American desert, to roast in the Nevada sun, and attend the Black Hat Briefings. While kibitzing with scores of friends, colleagues, kindred spirits, security mavens, hackers, cybercops, groupies and of course, "Feds," I thought it fitting to pay homage to the place—for me any way—where the theater of "Cyber Security" all came alive. Read More

Thumbnail Image

The Ultimate PC Bundle - Save Hundreds on 10 Top-Rated Apps Ft. Scrivener & CCleaner Pro - Deal Alert

The web is an incredible place, filled with a slew of programs and apps designed to help you get the most out of your PC. But which ones do you pick? Fortunately, the Ultimate PC Bundle is here, and it has curated 10 top-rated productivity, entertainment, and performance programs designed to breathe new life into your PC for only $39.99. Read More

Thumbnail Image
INSIDER

What your cyber risk profile tells insurers

The purpose of a cyber risk profile is to assess your organization's insurability. The work you do upfront can go a long way toward ensuring you get adequate cyber insurance coverage and a better rate to boot. Read More

Thumbnail Image

Why you need a strong authentication platform

With strong authentication, you can work securely across devices and locations, reduce IT burden and control costs, and secure consumer access to your data. Symantec's Information Protection Team offers tips for addressing common business challenges when it comes to protecting your company data. Read More

Thumbnail Image

Kill a smartphone password with a scan of your eye

The hardware and software to make iris scanning a key feature is now in place for smartphones and PCs. Read More

Thumbnail Image

How to best vet third-party vendors

Cloud providers have raised awareness of third party risks to security Read More

Thumbnail Image

200M Yahoo accounts go up for sale on digital black market

Yahoo users might want to reset their passwords. A hacker claims to have stolen the login information for 200 million Yahoo accounts and is selling them on the black market. Read More

Video/Webcast: 8x8 Inc

8x8 Gives You One Number to Rule Them All!

Demos don't have to be boring! Watch our whimsical 88-second video where we show how Jim is able to use his one phone number from 8x8 to take client calls anywhere, anytime on any device, much to the amazement and confusion of his customer, Sean. Read More

Top 5 Stories

1. Hackers create Safe Skies TSA master key from scratch, release designs
2. How to attract a board-level cybersecurity expert
3. Court ruling shows the internet does have borders after all
4. Long-running malvertising campaign infected thousands of computers per day
5. Trump's hacking comment rattles the cybersecurity industry

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 2:00 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive