Tuesday, January 31, 2017

How to eliminate insider threats

Details on 200,000 racing fans exposed by IndyCar

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Jan 31, 2017
Featured Image

How to eliminate insider threats

Mike McKee, CEO OF ObserveIT, lists some tips to help organizations quickly jump on any irregularities that come from within your company's network. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Details on 200,000 racing fans exposed by IndyCar
21% off Seagate Expansion 1TB Portable External Hard Drive USB 3.0 - Deal Alert
Blockchain secures e-voting, eliminates concerns of voter fraud
Spear phishing tough to block, even when using automation tools
MongoDB ransom attacks continue to plague administrators
Trump immigration ban means a war with tech
ICYMI: A new service for the less techie criminals

Video/Webcast: Riverbed Technology

Achieving End to End UC Visibility

Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC-network probes vs endpoint telemetry-and why taking a combined approach helps you monitor quality of experience and more quickly troubleshoot issues Read More

Thumbnail Image

Details on 200,000 racing fans exposed by IndyCar

Chris Vickery, a security researcher for MacKeeper, recently discovered an open Rsync server hosting the personal details for at least 200,000 racing fans. The data comes from a now defunct racing forum called DownForce, which closed several years ago, leaving Vickery to question why the data was kept in the first place. Read More

Thumbnail Image
DealPost

21% off Seagate Expansion 1TB Portable External Hard Drive USB 3.0 - Deal Alert

With no software to install, the Expansion Portable drive is ready to use immediately. Simply attach the USB cable to your computer and you're ready to start sending files. Read More

Thumbnail Image

Blockchain secures e-voting, eliminates concerns of voter fraud

College teams compete to develop blockchain-compliant systems and security challenges including voter privacy, undecided voters, and voter fraud. Read More

Thumbnail Image

Spear phishing tough to block, even when using automation tools

Trying to filter out phishing emails is tough work, even for organizations trying to find a better way through automation, according to a new study from security software company GreatHorn. Read More

Thumbnail Image

MongoDB ransom attacks continue to plague administrators

Earlier this month, Salted Hash reported on a surge in attacks against publicly accessible MongoDB installations. Since January 3, the day of that first report, the number of victims has climbed from about 200 databases to more than 40,000. In addition to MongoDB, those responsible for the attacks have started targeting Elasticsearch and CouchDB. Read More

Thumbnail Image

Trump immigration ban means a war with tech

President Donald Trump's move to impose a broad immigration ban on seven countries may affect industries like tech in ways he didn't anticipate. Read More

Thumbnail Image

ICYMI: A new service for the less techie criminals

Aditya K Sood, PhD, Director of Security and Cloud Threat Labs, Blue Coat Systems, a part of Symantec, details how cybercriminals can obtain sensitive data, like credit card numbers, names and addresses, with just a couple of clicks and a payment. Read More

White Paper: Riverbed Technology

APM in the Digital Economy What's Hot, What's Not, and What's on the Horizon

Applications are at the core of digital transformation. Intrinsically linked to the success of digital initiatives and the apps that power them are the areas of DevOps and Continuous Delivery. Underpinning all of these is the area of application performance management (APM). Read More

Top 5 Stories

1. Your favourite VPN app is harvesting your personal information
2. Breach notification website LeakedSource allegedly raided
3. What privacy profile do you fit?
4. A new service for the less techie criminals
5. How to defend against the latest Wi-Fi security threats

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:01 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive