Tuesday, June 26, 2018

DDoS attacks on the rise; China and Russia behind most credential abuse attacks, report

4 scams that illustrate the one-way authentication problem

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jun 26, 2018
Featured Image

DDoS attacks on the rise; China and Russia behind most credential abuse attacks, report

Akamai released its Summer 2018 State of the Internet / Security: Web Attack report; DDoS attacks are on the rise; China and Russia fingered for the most credential abuse attacks on hospitality industry. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

4 scams that illustrate the one-way authentication problem
$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert
8 AT&T buildings that are 'central to NSA spying'
Not hackers, but exes are remotely controlling smart devices as a form of domestic abuse
What is a zero-day exploit? A powerful but fragile weapon
Review: How InSpec 2.0 delivers comprehensive compliance

Video/Webcast: EMA Analyst Research

LIVE WEBINAR: Using Digital Threat Intelligence Management (DTIM) to Combat Threats

Is the time right for your organization to purchase a threat intelligence platform? Join leading IT analyst firm EMA and IntSights for a research-based webinar to find out if DTIM is right for your organization. You will also get key insights into new research, including the methodology behind platform evaluation and an overview of key players in the market. Read More

Thumbnail Image

4 scams that illustrate the one-way authentication problem

These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here's how vendors can prevent the scams. Read More

Thumbnail Image
DealPost

$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More

Thumbnail Image

8 AT&T buildings that are 'central to NSA spying'

Here are eight AT&T-owned locations, buildings that are reportedly central to the NSA's internet spying purposes. Read More

Thumbnail Image

Not hackers, but exes are remotely controlling smart devices as a form of domestic abuse

A new pattern of domestic abuse behavior has ex-spouses and ex-partners remotely controlling smart devices in victims homes. Read More

Thumbnail Image

What is a zero-day exploit? A powerful but fragile weapon

A zero-day is a security flaw that has not yet been patched by the vendor and can be exploited. These vulnerabilities fetch high prices on the black market Read More

Thumbnail Image
INSIDER

Review: How InSpec 2.0 delivers comprehensive compliance

The InSpec 2.0 platform from Chef tackles compliance head-on, tailored to the specific rules and guidelines that a company wants or needs. It is designed to both make sense of regulatory and technical guidelines and ensure that a network is protected according to those rules. Read More

White Paper: Webroot Software

Why Efficacy is Paramount

Malware detection itself is not the only factor to consider when choosing an endpoint security solution. In addition to initial detection, comprehensive endpoint security must a number of things. Read more to find out. Read More

CSO Insider

1. Does it matter who the CISO reports to?
2. 8 hot cyber security trends (and 4 going cold)
3. What is the New York Cybersecurity Regulation? What you need to do to comply
4. The 10 Windows group policy settings you need to get right
5. Information security in a war zone: How the Red Cross protects its data

Editor's Picks

1. Ready for more secure authentication? Try these password alternatives and enhancements
2. What is a CASB? What you need to know before you buy
3. Cloud functions present new security challenges
4. Review: Seceon soups up standard SIEM
5. The IoT security basics survival guide
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:03 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive