Thursday, May 31, 2018

FBI, DHS warn of North Korean RAT and worm malware

CIA contractor secretly hoards his classified work

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

May 31, 2018
Featured Image

FBI, DHS warn of North Korean RAT and worm malware

The U.S. government released an alert about two strains of North Korean malware that are being used by Hidden Cobra. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

CIA contractor secretly hoards his classified work
$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert
How Facebook protects data with physical security
What does a ransomware attack cost? Beware the hidden expenses
2 Canadian banks hacked, 90,000 customers' data stolen
Mark your calendar for June 13

Video/Webcast: Citrix Systems Inc

Chrome OS & Citrix: Simplify Endpoint Management and VDI Strategy

According to SIM IT Trends survey, 2017, Security/Cybersecurity/Privacy remains the second biggest business concern (only behind Alignment of IT and/with the Business) and the most worrisome personal concern of IT managers. Read More

Thumbnail Image

CIA contractor secretly hoards his classified work

Former CIA contractor Reynaldo Regis pled guilty to keeping secret notebooks of his work within the CIA from 2006-2016 and storing the notebooks in his home. Read More

Thumbnail Image
DealPost

$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More

Thumbnail Image

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook's global security data centers team guards intellectual property. It's an integrated approach where even the company's office buildings are designed to put physical protection between servers and the public. Read More

Thumbnail Image

What does a ransomware attack cost? Beware the hidden expenses

The ransom is only a tiny portion of the total cost of a ransomware attack. Consider these associated costs when estimating the total damage. Read More

Thumbnail Image

2 Canadian banks hacked, 90,000 customers' data stolen

Bank of Montreal and the Canadian Imperial Bank of Commerce's Simplii Financial confirmed hackers stole the personal and financial data of thousands of customers. Read More

Thumbnail Image

Mark your calendar for June 13

We'll be in San Francisco on June 13 for the industry's first zero trust conference for CIOs & CSOs. Sign up today for your free pass! Read More

Video/Webcast: Software AG

Saving Millions with a Better View of Your IT Infrastructure

You need to deliver on your digital strategy, but how do you gain enough control and oversight of your IT infrastructure to identify the necessary savings? In this short presentation, you'll hear how Software AG's Alfabet IT Transformation Platform (ranked #1 by Gartner and Forrester) has helped many of the world's largest companies save millions in IT costs. Read More

CSO Insider

1. 8 hot cyber security trends (and 4 going cold)
2. 11 tips to prevent phishing
3. Sample computer and e-mail usage policy
4. State of Cybercrime: Security events decline, but not the impact
5. 6 use cases for blockchain in security

Editor's Picks

1. What's new in Windows 10 security features: The privacy edition
2. 11 ways to hack 2FA
3. 7 highest-paying IT security jobs, 2018
4. A quick tour of the Dark Web
5. What an Apple phishing attack looks like
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:05 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive