CSO

CSO Update

February 14, 2019

Image: How 5 universities stretch security capabilities, budgets with shared SOC

How 5 universities stretch security capabilities, budgets with shared SOC

Faced with limited resources and constant threat of attack, five midwestern universities created OmniSOC, a CSO50 award-winning joint security operations center, to complement their own on-site SOCs with 24/7 analysis, triage and threat hunting. Read more ▶

Your Must-Read Stories

Beware of phony or misleading malware rescue web pages

Preventing (and recovering from) an APT attack through a managed service provider

How MitM attacks work and how to prevent them

Disastrous cyber attack on email provider wipes US servers and backups

Popular electric scooters can be remotely hacked

Android phones can be hacked remotely by viewing malicious PNG image

Case Study: Base2 Solutions

Augmented Reality Case Study

By downloading this case study, you can learn what new challenges AR brings, and how to successfully overcome these challenges. Read more ▶

Image: Beware of phony or misleading malware rescue web pages

Beware of phony or misleading malware rescue web pages

A search on an unfamiliar executable file brings you to a malware rescue page that says it's bad and you should download their software to remove. Here's how to tell if it's real. Read more ▶

Image: Get TotalAV Essential AntiVirus for $19.99 (80% off)

FROM OUR BUSINESS PARTNERS

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike. Read more ▶

Image: Preventing (and recovering from) an APT attack through a managed service provider

Preventing (and recovering from) an APT attack through a managed service provider

Threat actors are compromising their targeted victims through managed service providers (MSPs). These are the steps to take to minimize your exposure and to recover from these attacks if necessary. Read more ▶

 
 
Image: How MitM attacks work and how to prevent them

How MitM attacks work and how to prevent them

A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Detecting MitM attacks is difficult, but they are preventable. Read more ▶

Image: Disastrous cyber attack on email provider wipes US servers and backups

Disastrous cyber attack on email provider wipes US servers and backups

A cyber attack on email provider VFEmail caused "catastrophic destruction," with hackers wiping the servers and backups. Read more ▶

Image: Popular electric scooters can be remotely hacked

Popular electric scooters can be remotely hacked

Researchers warned that Xiaomi M365 scooters can be remotely hacked from 100 meters away to slam on the brakes or to accelerate. Read more ▶

Image: Android phones can be hacked remotely by viewing malicious PNG image

Android phones can be hacked remotely by viewing malicious PNG image

Android users are being told to patch their Android OS Nougat (7.0), Oreo (8.0) and Pie (9.0) as soon as updates are available after a bug related to PNG images was found. Read more ▶

eBook: Base2 Solutions

Digital Innovation eBook

Download this eBook to Get started with your digital innovation transformation today. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.