Thursday, May 24, 2018

FBI 'Going Dark' whopper: Locked out of only 1,200 phones, not 7,775

Chinese citizen tries to steal advanced robotic technology IP

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

May 24, 2018
Featured Image

FBI 'Going Dark' whopper: Locked out of only 1,200 phones, not 7,775

The FBI blames programming errors for grossly inflating the number of encrypted, unhackable phones it said it needed backdoors into. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Chinese citizen tries to steal advanced robotic technology IP
$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert
Cybercriminals impersonate popular file sharing services to take over email accounts
The Pentagon has a project that aims to verify identity via smartphone
Microsoft locks down Windows 10 with the S edition
24 best free security tools

White Paper: Palo Alto Networks

10 Things Your Next Firewall Must Do

As the leader and pioneer of the next-generation firewall category, Palo Alto Networks would like to share what we have learned from securing over 3,500 enterprise networks in the past few years. Download our guide that depicts the top 10 requirements you should demand in your next firewall purchase. Read More

Thumbnail Image

Chinese citizen tries to steal advanced robotic technology IP

Medrobotics' CEO caught Dong Liu in the company's conference room attempting to steal advanced robotic intellectual property. Read More

Thumbnail Image
DealPost

$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More

Thumbnail Image

Cybercriminals impersonate popular file sharing services to take over email accounts

Email account takeover attacks are growing, and attackers are impersonating OneDrive and other popular web services to steal credentials from employees. Read More

Thumbnail Image

The Pentagon has a project that aims to verify identity via smartphone

A Pentagon-funded project that aims to add tech to verify identity and ultimately to assign a "risk score" to you could be included in new smartphones within two years. Read More

Thumbnail Image

Microsoft locks down Windows 10 with the S edition

New security features and limits on what you can load and customize promise to make Microsoft Windows 10 S the more secure version ever. It might not be for everyone, though. Read More

Thumbnail Image

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier. Read More

White Paper: PTC

4 Reasons Remote Monitoring is Your Best Move to Better Service

Download this free e-book to discover how companies are realizing proven returns with IoT-enabled remote monitoring, which can be quickly implemented and monetized. Read More

CSO Insider

1. 8 hot cyber security trends (and 4 going cold)
2. 11 tips to prevent phishing
3. Sample computer and e-mail usage policy
4. State of Cybercrime: Security events decline, but not the impact
5. 6 use cases for blockchain in security

Editor's Picks

1. What's new in Windows 10 security features: The privacy edition
2. 11 ways to hack 2FA
3. 7 highest-paying IT security jobs, 2018
4. A quick tour of the Dark Web
5. What an Apple phishing attack looks like
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:03 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive