Monday, February 27, 2017

How to scrub your private data from 'people finder' sites

Has fraud met its match?

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Feb 27, 2017
Featured Image

How to scrub your private data from 'people finder' sites

The internet has your number—among many other deets. Prevent identity theft and doxxing by erasing yourself from aggregator sites like Spokeo and PeekYou Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Has fraud met its match?
Alienware 13 Gaming Notebooks Discounted Up To $169 For a Limited Time - Deal Alert
Why DRaaS is a better defense against ransomware
The future of biometrics and IoT
Are you afraid your car will be taken over?
Ransomware 'customer support' chat reveals criminals' ruthlessness
Carders capitalize on Cloudflare problems, claim 150 million logins for sale

Research/Infographic: ITS Partners

10 Examples of Employee Behaviors in the Cloud That Can Increase Risk

Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions introduce risk. We've summarized the top risky actions employees are taking in an infographic you should print and post on your door. Read More

Thumbnail Image

Has fraud met its match?

New and dynamic authentication factors can help prevent identity theft. The idea of using a fingerprint reader to log on to a smartphone is nothing new, but the latest wrinkle is the pressure with which that finger pushes on the reader. Read More

Thumbnail Image
DealPost

Alienware 13 Gaming Notebooks Discounted Up To $169 For a Limited Time - Deal Alert

Alienware's first 13-inch VR gaming laptop features up to 7th Gen Intel Quad Core H- Class processors and NVIDIA GeForce GTX 10-Series graphics. For a limited time various configurations have been discounted up to $169 with free shipping. Read More

Thumbnail Image

Why DRaaS is a better defense against ransomware

Dean Nicolls, vice president of marketing at Infrascale, shares some tangible ways disaster recovery as a service (DRaaS) can pay big dividends and quickly restore systems in the wake of a ransomware attack. Read More

Thumbnail Image
INSIDER

The future of biometrics and IoT

Many people are familiar with biometrics as a security measure at airports or police stations, where they often use a fingerprint as a form of identification, but there are many other uses outside of law enforcement. Read More

Thumbnail Image

Are you afraid your car will be taken over?

A consortium was recently created to make sure that your car stays on the road and in your control. Read More

Thumbnail Image

Ransomware 'customer support' chat reveals criminals' ruthlessness

Finnish security vendor F-Secure released 34 pages of transcripts from the group chat used by the crafters of the Spora ransomware family. The transcripts give a whole new meaning to tech support. Read More

Thumbnail Image

Carders capitalize on Cloudflare problems, claim 150 million logins for sale

A carder forum is advertising a special deal to VIP members. The website claims to possess more than 150 million logins, from a number of services including Netflix, and Uber. Read More

Research/Infographic: ITS Partners

11 Visibility and Control Outcomes of a Mature Cloud Defense System

Most everyone knows that as cloud adoption increases, the maturity of cloud security must also increase. But, before investing in the latest and greatest tools, we always recommend that CISOs start by defining what outcomes are important to them - defining what they want their cloud security system to accomplish. Download the infographic to uncover and evaluate the 11 critical outcomes you will need from your cloud defense solution. Read More

Top 5 Stories

1. Bleeding clouds: Cloudflare server errors blamed for leaked customer data
2. Carders capitalize on Cloudflare problems, claim 150 million logins for sale
3. What to expect from the Trump administration on cybersecurity
4. Java and Python FTP attacks can punch holes through firewalls
5. 5 ways to spot a phishing email

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 4:00 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive