Thursday, July 20, 2017

Scammers deliver empty threats, Best of Black Hat, developer exposes patient data, top cloud security controls

The best of Black Hat: The consequential, the controversial, the canceled

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jul 20, 2017
Featured Image

Scammers demand Bitcoin in DDoS extortion scheme, deliver empty threats

The FBI has issued an advisory to businesses over a recent string of DDoS extortion attempts. The perpetrators are claiming to be affiliated with Anonymous or Lizard Squad, and their demands threaten sustained attacks unless a Bitcoin payment is made. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The best of Black Hat: The consequential, the controversial, the canceled
Get $100 off Amazon Echo When You Buy 2 Right Now - Deal Alert
Developer hangs patient data out in a cloud—for two years
Top cloud security controls you should be using

eBook: Smartling

Five Trends Shaping the Future of Global Marketing

Smartling commissioned three separate surveys to uncover the global readiness of distinct audiences. Each group responded to questions about their international marketing efforts, plans, notable obstacles and hoped-for improvements. Find out the five valuable observations drawn from across all three surveys. Read More

Thumbnail Image

The best of Black Hat: The consequential, the controversial, the canceled

Over the past two decades, the annual Black Hat conference has had its share of controversy. CSO looks back at the most significant talks and demonstrations. Read More

Thumbnail Image
DealPost

Get $100 off Amazon Echo When You Buy 2 Right Now - Deal Alert

Put 2 Echo devices in your cart and Amazon will credit you back $100 right now. But you'll have to use a special code at checkout. Read More

Thumbnail Image

Developer hangs patient data out in a cloud—for two years

In 2015, a developer at UIHC inadvertently put the personal data of about 5,300 patients in an open store in the cloud. UIHC found out about it in 2017. Read More

Thumbnail Image

Top cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind to secure your cloud workloads. Read More

White Paper: Smartling

7 Symptoms in a Broken Translation Process

Thousands of broken translation processes go undiagnosed each year. It's not like translation teams haven't felt the pain, however. Many limp through their review cycles, wince at the sight of their invocies, and cringe with every correction request. The real issue is an inability to determine what's causing the pain - and the prevailing sense that what they're feeling isn't all that serious. Read More

CSO Insider

1. How computer security pros hack the hackers
2. How and why to hire a CISO
3. Don't like Mondays? Neither do attackers
4. Crowdsourcing application security closes the automated assessment gap
5. Two years after the OPM data breach: What government agencies must do now

Editor's Picks

1. 7 elements of a successful security awareness program
2. A Blue Team's reference guide to dealing with ransomware
3. How to spot and prevent insider threats
4. The fault for ransomware attacks lies with the challenges security teams face
5. Security problems exist despite CIP compliance
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive