Wednesday, May 30, 2018

2 Canadian banks hacked, 90,000 customers' data stolen

David Jewberg — social engineering the Russia conversation

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

May 30, 2018
Featured Image

2 Canadian banks hacked, 90,000 customers' data stolen

Bank of Montreal and the Canadian Imperial Bank of Commerce's Simplii Financial confirmed hackers stole the personal and financial data of thousands of customers. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

David Jewberg — social engineering the Russia conversation
$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert
Are regulations keeping you from using good passwords?
Inside a phishing attack: What the criminal sees
What does a ransomware attack cost? Beware the hidden expenses
Join us for the industry's first zero trust conference for CIOs and CSOs.

White Paper: Palo Alto Networks

10 Things Your Next Firewall Must Do

As the leader and pioneer of the next-generation firewall category, Palo Alto Networks would like to share what we have learned from securing over 3,500 enterprise networks in the past few years. Download our guide that depicts the top 10 requirements you should demand in your next firewall purchase. Read More

Thumbnail Image

David Jewberg — social engineering the Russia conversation

The David Jewberg persona trolled Russian and Ukrainian media. The question remains: Was it the alter ego of Dan Rapoport or a creation to social engineer the Russian dialog? Read More

Thumbnail Image
DealPost

$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More

Thumbnail Image

Are regulations keeping you from using good passwords?

Most companies are using password "best practices" that are out of date and ineffective. Regulations are getting in the way of changing them. Read More

Thumbnail Image

Inside a phishing attack: What the criminal sees

In April, TSB (a retail and commercial bank in the UK) announced they would shutdown some systems for an IT upgrade. However, the upgrade was a disaster, and over a month later customers are still having problems. As a result, criminals have turn to phishing in order to capitalize on the chaos created by the botched IT upgrade. Read More

Thumbnail Image

What does a ransomware attack cost? Beware the hidden expenses

The ransom is only a tiny portion of the total cost of a ransomware attack. Consider these associated costs when estimating the total damage. Read More

Thumbnail Image

Join us for the industry's first zero trust conference for CIOs and CSOs.

We'll be in San Francisco on June 13. Get your complimentary pass today! Read More

White Paper: PTC

4 Reasons Remote Monitoring is Your Best Move to Better Service

Download this free e-book to discover how companies are realizing proven returns with IoT-enabled remote monitoring, which can be quickly implemented and monetized. Read More

CSO Insider

1. 8 hot cyber security trends (and 4 going cold)
2. 11 tips to prevent phishing
3. Sample computer and e-mail usage policy
4. State of Cybercrime: Security events decline, but not the impact
5. 6 use cases for blockchain in security

Editor's Picks

1. What's new in Windows 10 security features: The privacy edition
2. 11 ways to hack 2FA
3. 7 highest-paying IT security jobs, 2018
4. A quick tour of the Dark Web
5. What an Apple phishing attack looks like
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:04 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive