Loading...
Internet Security Directory
CSO: 2014
-
Home
Browse
Contribute
Submit
About Us
Contact
/
Home
/
Internet Security: Articles
/
Internet Security: CSO
/CSO: 2014
CSO: 3 low-tech threats that lead to high-profile breaches
Votes:3
Comments:0
By Larry Ponemon Dec 16, 2014 In an age where data security defenses are getting more and more sophisticated, there will be increased pressure for malicious parties to glean information from withi
READ MORE
http://www.csoonline.com/article/2859482/data-protection/3-low-tech-th...
CSO: Top malware families turn point-of-sale into point-of-theft
Votes:11
Comments:0
For retailers, and shoppers, the most wonderful time of the year is also the most dangerous. By Taylor Armerding Dec 17, 2014 A wide range of choices for consumers is one of the things that mak
READ MORE
http://www.csoonline.com/article/2860416/malware-cybercrime/top-malwar...
CSO: Apple's iWorm fix still leaves major hole
Votes:39
Comments:0
XProtect isn't protecting against everything By Maria Korolov Nov 5, 2014 Apple released detection signatures for the iWorm backdoor malware in early October, but researchers now say that the f
READ MORE
http://www.csoonline.com/article/2843868/malware-cybercrime/apples-iwo...
CSO: 6 things we learned from this year's security breaches
Votes:6
Comments:0
By Maria Korolov Nov 3, 2014 According to the Open Security Foundation, three out of 10 of the all-time worst security breaches happened this year. That includes 173 million records from the NYC T
READ MORE
http://www.csoonline.com/article/2842532/data-breach/6-things-we-learn...
CSO: Are you prepared to handle the rising tide of ransomware?
Votes:7
Comments:0
Ransomware is on the rise, even as we tend to underestimate the risk By Michael Santarcangelo Sep 2, 2014 Have you dealt with ransomware or know someone who has? Is it something you take seriou
READ MORE
http://www.csoonline.com/article/2601082/security-leadership/are-you-p...
CSO: Router malware: Fact or fiction?
Votes:31
Comments:0
Given that malicious software isn't always found locally on the machine itself, Ronald and Dylan Kaplan share how to pinpoint the characteristics of router malware By Ronald Kaplan and Dylan Kaplan
READ MORE
http://www.csoonline.com/article/2599652/data-protection/router-malwar...
CSO: Botnet brute-forces remote access to point-of-sale systems
Votes:14
Comments:0
A new malware threat scans the Internet for POS systems and tries to access them using common usernames and passwords By Lucian Constantin Jul 9, 2014 Thousands of compromised computers are act
READ MORE
http://www.csoonline.com/article/2451773/data-protection/botnet-brute-...
CSO: Researchers find large global botnet of infected PoS systems
Votes:24
Comments:0
By Lucian Constantin May 23, 2014 Security researchers uncovered a global cybercriminal operation that infected with malware almost 1,500 point-of-sale (POS) terminals, accounting systems and othe
READ MORE
http://www.csoonline.com/article/2158606/security/researchers-find-lar...
CSO: Five new threats to your mobile device security
Votes:35
Comments:0
Relentless cyber criminals are always looking for the next big hack, and mobile devices are the new frontier By Stacy Collett May 21, 2014 Attacks that proved successful on PCs are now being te
READ MORE
http://www.csoonline.com/article/2157785/data-protection/five-new-thre...
CSO: The Internet of Things: An exploding security minefield
Votes:37
Comments:0
Duo Security duo tells SOURCE Boston audience that security is not even an afterthought for small IoT device entrepreneurs By Taylor Armerding Apr 11, 2014 Everybody from the Federal Trade Comm
READ MORE
http://www.csoonline.com/article/2142722/data-protection/the-internet-...
CSO: Five things to know about malware before driving it out
Votes:30
Comments:0
Security teams need to be able to differentiate between inconsequential and truly damaging malware so resources aren't diverted towards chasing the wrong threat, says Cyphort's Shel Sharma By Shel
READ MORE
http://www.csoonline.com/article/749307/five-things-to-know-about-malw...
CSO: Pre-installed malware turns up on new phones
Votes:21
Comments:0
A fake version of Netflix that steals personal data and sends it to Russia has been found on several phone models By Jeremy Kirk March 05, 2014 David Jevans, CTO and founder of Marble Security,
READ MORE
http://www.csoonline.com/article/749239/pre-installed-malware-turns-up...
CSO: Malware has changed, but its name hasn't -- and likely won't
Votes:35
Comments:0
Experts say re-naming 'malware' would be pointless. But they agree it has become much different and much more dangerous By Taylor Armerding February 20, 2014 What's in a name? For one security
READ MORE
http://www.csoonline.com/article/748522/malware-has-changed-but-its-na...
CSO: 6 tips to combat Advanced Persistent Threats
Votes:16
Comments:0
Experts say takes time, training and collaboration to thwart APTs. But with these best practices, you can keep your defenses high By Taylor Armerding February 18, 2014 The success of advanced p
READ MORE
http://www.csoonline.com/article/748379/6-tips-to-combat-advanced-pers...
CSO: 6 tips for smartphone privacy and security
Votes:7
Comments:0
Computer forensic expert Ronald Kaplan thinks you should stop using your smartphone if you want any semblance of privacy in today's digital world. But, if you insist on keeping yourself electronically
READ MORE
http://www.csoonline.com/article/748093/6-tips-for-smartphone-privacy-...
CSO: CSO's guide to Advanced Persistent Threats
Votes:29
Comments:0
In this series of articles, we examine the processes, tools, and methods used by criminals during a targeted attack By Steve Ragan January 27, 2014 APTs are both nightmares and the stuff of leg
READ MORE
http://www.csoonline.com/article/747158/cso-s-guide-to-advanced-persis...
CSO: iOS vs. Android: Which is more secure?
Votes:34
Comments:0
When it comes down to actually protecting enterprise users, is one mobile operating system - Android or iOS - more secure than another? By George V. Hulme January 28, 2014 With millions of new
READ MORE
http://www.csoonline.com/article/747278/ios-vs.-android-which-is-more-...
CSO: The processes and tools behind a true APT campaign: Overview
Votes:14
Comments:0
Steve Ragan 22 January, 2014 This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and
READ MORE
http://www.cso.com.au/article/536510/processes_tools_behind_true_apt_c...
CSO: The processes and tools behind a true APT campaign: Exfiltration
Votes:17
Comments:0
Steve Ragan 22 January, 2014 This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and
READ MORE
http://www.cso.com.au/article/536511/processes_tools_behind_true_apt_c...
CSO: The processes and tools behind a true APT campaign: Weaponization and deliv...
Votes:33
Comments:0
Steve Ragan 22 January, 2014 This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and
READ MORE
http://www.cso.com.au/article/536509/processes_tools_behind_true_apt_c...
CSO: The processes and tools behind a true APT campaign: Exploitation and Instal...
Votes:19
Comments:0
Steve Ragan 22 January, 2014 This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and
READ MORE
http://www.cso.com.au/article/536507/processes_tools_behind_true_apt_c...
CSO: The processes and tools behind a true APT campaign: Reconnaissance
Votes:30
Comments:0
Steve Ragan 22 January, 2014 This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and
READ MORE
http://www.cso.com.au/article/536512/processes_tools_behind_true_apt_c...
2014 CSO articles
Sites of Interest
New Items
Dark Reading: Ransomware Has E
Dark Reading: Newly Discovered
CIO: 4 information security th
CSO: Remain paranoid, err vigi
CSO: Ransomworm: the next leve
InfoWorld - Security Adviser:
PCWorld: The year ransomware b
PC Magazine: The Best Encrypti
InfoWorld - Security Adviser:
Dark Reading: Spammers Work Up
-
Subscribe
Search
Search
Search
Search
Login
Privacy Policy