Sunday, October 30, 2016

How to approach keeping your IoT devices safe

Malware from Friday's DDoS attack continues to harass in short bursts

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Oct 30, 2016
Featured Image

How to approach keeping your IoT devices safe

With the recent take down of DYN and Brian Krebs' web site, cybercriminals have found a way to use your own devices to bring the internet to its knees. Portnox's CEO Ofer Amitai provides some ways to keep those devices safe from these attacks. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Malware from Friday's DDoS attack continues to harass in short bursts
How to stop the Army of Things
The limits of encryption
No need to shoot down drones! Many of them can now be hijacked

White Paper: Pure Storage

2016 Gartner Magic Quadrant Report for Solid-State Arrays

Gartner has done the research for you. Help your organization make an informed IT decision regarding flash storage. Read the 2016 Gartner Magic Quadrant for Solid-State Arrays to gain insights regarding the future state of the storage market and an independent vendor comparison. Also learn why Pure Storage achieved the furthest overall position for completeness of vision. Read More

Thumbnail Image

Malware from Friday's DDoS attack continues to harass in short bursts

It's still unclear who pulled off Friday's massive internet disruption, but the malware largely responsible for the cyber attack has since been found assaulting new targets -- possibly video gamers. Read More

Thumbnail Image

How to stop the Army of Things

On Oct. 21, a massive distributed denial of service attack employing thousands of compromised internet connected devices brought down dozens of company websites. Private businesses must lead the offensive against the 'Army of Things' by demanding the elimination of password based security. Read More

Thumbnail Image

The limits of encryption

The latest WikiLeaks revelations included a reminder that there are revealing things that just can't be encrypted. Read More

Thumbnail Image

No need to shoot down drones! Many of them can now be hijacked

A security researcher has devised a method of hijacking a wide variety of radio controlled airplanes, helicopters, cars, boats and other devices that use a popular wireless transmission technology. Read More

Case Study: IBM Corporation

Case Study: Simplify, Save and Innovate

Learn how IBM helped a leading bank's IT organization focus on innovation and strategic projects while massively reducing costs and streamlining operations. Read More

Top 5 Stories

1. John McAfee: 'Iran hacked the DNC, and North Korea hacked DYN'
2. Amateurs were behind the Dyn Inc. DDoS attack, report says
3. Overweight, out of shape: Hack your body back
4. Chinese firm admits its hacked products were behind Friday's massive DDOS attack
5. Bots may be trumping online polls

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive