How 5 universities stretch security capabilities, budgets with shared SOC Beware of phony or misleading malware rescue web pages CSO Update February 14, 2019 How 5 universities stretch security capabilities, budgets with shared SOC Faced with limited resources and constant threat of attack, five midwestern universities created OmniSOC, a CSO50 award-winning joint security operations center, to complement their own on-site SOCs with 24/7 analysis, triage and threat hunting. Read more ▶ Your Must-Read Stories • Beware of phony or misleading malware rescue web pages • Preventing (and recovering from) an APT attack through a managed service provider • How MitM attacks work and how to prevent them • Disastrous cyber attack on email provider wipes US servers and backups • Popular electric scooters can be remotely hacked • Android phones can be hacked remotely by viewing malicious PNG image Case Study: Base2 Solutions Augmented Reality Case Study By downloading this case study, you can learn what new challenges AR brings, and how to successfully overcome these challenges. Read more ▶ Beware of phony or misleading malware rescue web pages A search on an unfamiliar executable file brings you to a malware rescue page that says it's bad and you should download their software to remove. Here's how to tell if it's real. Read more ▶ FROM OUR BUSINESS PARTNERS Get TotalAV Essential AntiVirus for $19.99 (80% off) TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike. Read more ▶ Preventing (and recovering from) an APT attack through a managed service provider Threat actors are compromising their targeted victims through managed service providers (MSPs). These are the steps to take to minimize your exposure and to recover from these attacks if necessary. Read more ▶ How MitM attacks work and how to prevent them A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Detecting MitM attacks is difficult, but they are preventable. Read more ▶ Disastrous cyber attack on email provider wipes US servers and backups A cyber attack on email provider VFEmail caused "catastrophic destruction," with hackers wiping the servers and backups. Read more ▶ Popular electric scooters can be remotely hacked Researchers warned that Xiaomi M365 scooters can be remotely hacked from 100 meters away to slam on the brakes or to accelerate. Read more ▶ Android phones can be hacked remotely by viewing malicious PNG image Android users are being told to patch their Android OS Nougat (7.0), Oreo (8.0) and Pie (9.0) as soon as updates are available after a bug related to PNG images was found. Read more ▶ eBook: Base2 Solutions Digital Innovation eBook Download this eBook to Get started with your digital innovation transformation today. Read more ▶ Email not displaying correctly? View it in your browser You are currently subscribed to CSO Update as tuwanan.mono@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy Learn more about Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701 Please do not reply to this message. To contact someone directly, send an email to newsletters@idg.com.