Loading...


Internet Security Directory
CSO: 2014

-

CSO: 3 low-tech threats that lead to high-profile breaches

Votes:3 Comments:0
By Larry Ponemon Dec 16, 2014 In an age where data security defenses are getting more and more sophisticated, there will be increased pressure for malicious parties to glean information from withi READ MORE
http://www.csoonline.com/article/2859482/data-protection/3-low-tech-th...

CSO: Top malware families turn point-of-sale into point-of-theft

Votes:11 Comments:0
For retailers, and shoppers, the most wonderful time of the year is also the most dangerous. By Taylor Armerding Dec 17, 2014 A wide range of choices for consumers is one of the things that mak READ MORE
http://www.csoonline.com/article/2860416/malware-cybercrime/top-malwar...

CSO: Apple's iWorm fix still leaves major hole

Votes:39 Comments:0
XProtect isn't protecting against everything By Maria Korolov Nov 5, 2014 Apple released detection signatures for the iWorm backdoor malware in early October, but researchers now say that the f READ MORE
http://www.csoonline.com/article/2843868/malware-cybercrime/apples-iwo...

CSO: 6 things we learned from this year's security breaches

Votes:6 Comments:0
By Maria Korolov Nov 3, 2014 According to the Open Security Foundation, three out of 10 of the all-time worst security breaches happened this year. That includes 173 million records from the NYC T READ MORE
http://www.csoonline.com/article/2842532/data-breach/6-things-we-learn...

CSO: Are you prepared to handle the rising tide of ransomware?

Votes:7 Comments:0
Ransomware is on the rise, even as we tend to underestimate the risk By Michael Santarcangelo Sep 2, 2014 Have you dealt with ransomware or know someone who has? Is it something you take seriou READ MORE
http://www.csoonline.com/article/2601082/security-leadership/are-you-p...

CSO: Router malware: Fact or fiction?

Votes:31 Comments:0
Given that malicious software isn't always found locally on the machine itself, Ronald and Dylan Kaplan share how to pinpoint the characteristics of router malware By Ronald Kaplan and Dylan Kaplan READ MORE
http://www.csoonline.com/article/2599652/data-protection/router-malwar...

CSO: Botnet brute-forces remote access to point-of-sale systems

Votes:14 Comments:0
A new malware threat scans the Internet for POS systems and tries to access them using common usernames and passwords By Lucian Constantin Jul 9, 2014 Thousands of compromised computers are act READ MORE
http://www.csoonline.com/article/2451773/data-protection/botnet-brute-...

CSO: Researchers find large global botnet of infected PoS systems

Votes:24 Comments:0
By Lucian Constantin May 23, 2014 Security researchers uncovered a global cybercriminal operation that infected with malware almost 1,500 point-of-sale (POS) terminals, accounting systems and othe READ MORE
http://www.csoonline.com/article/2158606/security/researchers-find-lar...

CSO: Five new threats to your mobile device security

Votes:35 Comments:0
Relentless cyber criminals are always looking for the next big hack, and mobile devices are the new frontier By Stacy Collett May 21, 2014 Attacks that proved successful on PCs are now being te READ MORE
http://www.csoonline.com/article/2157785/data-protection/five-new-thre...

CSO: The Internet of Things: An exploding security minefield

Votes:37 Comments:0
Duo Security duo tells SOURCE Boston audience that security is not even an afterthought for small IoT device entrepreneurs By Taylor Armerding Apr 11, 2014 Everybody from the Federal Trade Comm READ MORE
http://www.csoonline.com/article/2142722/data-protection/the-internet-...

CSO: Five things to know about malware before driving it out

Votes:30 Comments:0
Security teams need to be able to differentiate between inconsequential and truly damaging malware so resources aren't diverted towards chasing the wrong threat, says Cyphort's Shel Sharma By Shel READ MORE
http://www.csoonline.com/article/749307/five-things-to-know-about-malw...

CSO: Pre-installed malware turns up on new phones

Votes:21 Comments:0
A fake version of Netflix that steals personal data and sends it to Russia has been found on several phone models By Jeremy Kirk March 05, 2014 David Jevans, CTO and founder of Marble Security, READ MORE
http://www.csoonline.com/article/749239/pre-installed-malware-turns-up...

CSO: Malware has changed, but its name hasn't -- and likely won't

Votes:35 Comments:0
Experts say re-naming 'malware' would be pointless. But they agree it has become much different and much more dangerous By Taylor Armerding February 20, 2014 What's in a name? For one security READ MORE
http://www.csoonline.com/article/748522/malware-has-changed-but-its-na...

CSO: 6 tips to combat Advanced Persistent Threats

Votes:16 Comments:0
Experts say takes time, training and collaboration to thwart APTs. But with these best practices, you can keep your defenses high By Taylor Armerding February 18, 2014 The success of advanced p READ MORE
http://www.csoonline.com/article/748379/6-tips-to-combat-advanced-pers...

CSO: 6 tips for smartphone privacy and security

Votes:7 Comments:0
Computer forensic expert Ronald Kaplan thinks you should stop using your smartphone if you want any semblance of privacy in today's digital world. But, if you insist on keeping yourself electronically READ MORE
http://www.csoonline.com/article/748093/6-tips-for-smartphone-privacy-...

CSO: CSO's guide to Advanced Persistent Threats

Votes:29 Comments:0
In this series of articles, we examine the processes, tools, and methods used by criminals during a targeted attack By Steve Ragan January 27, 2014 APTs are both nightmares and the stuff of leg READ MORE
http://www.csoonline.com/article/747158/cso-s-guide-to-advanced-persis...

CSO: iOS vs. Android: Which is more secure?

Votes:34 Comments:0
When it comes down to actually protecting enterprise users, is one mobile operating system - Android or iOS - more secure than another? By George V. Hulme January 28, 2014 With millions of new READ MORE
http://www.csoonline.com/article/747278/ios-vs.-android-which-is-more-...

CSO: The processes and tools behind a true APT campaign: Overview

Votes:14 Comments:0
Steve Ragan 22 January, 2014 This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and READ MORE
http://www.cso.com.au/article/536510/processes_tools_behind_true_apt_c...

CSO: The processes and tools behind a true APT campaign: Exfiltration

Votes:17 Comments:0
Steve Ragan 22 January, 2014 This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and READ MORE
http://www.cso.com.au/article/536511/processes_tools_behind_true_apt_c...

CSO: The processes and tools behind a true APT campaign: Weaponization and deliv...

Votes:33 Comments:0
Steve Ragan 22 January, 2014 This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and READ MORE
http://www.cso.com.au/article/536509/processes_tools_behind_true_apt_c...

CSO: The processes and tools behind a true APT campaign: Exploitation and Instal...

Votes:19 Comments:0
Steve Ragan 22 January, 2014 This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and READ MORE
http://www.cso.com.au/article/536507/processes_tools_behind_true_apt_c...

CSO: The processes and tools behind a true APT campaign: Reconnaissance

Votes:30 Comments:0
Steve Ragan 22 January, 2014 This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and READ MORE
http://www.cso.com.au/article/536512/processes_tools_behind_true_apt_c...
2014 CSO articles
Sites of Interest
-
Subscribe



Search
Search
Search
Search
Login
Privacy Policy