Email account takeover attacks are growing, and attackers are impersonating OneDrive and other popular web services to steal credentials from employees. Read More ▶ |
|
| White Paper: Freudenberg IT LP (FIT) Even though most organizations understand the need to protect the enterprise against malware, it's clear not all technology can do the job. But there's good news: organizations can partner with a managed service provider (MSP) to provide missing expertise and oversight, and ensure they have the right security tools in place. Read More ▶ | Researcher discovered TeenSafe stored thousands of kids’ Apple IDs in plaintext on an unprotected AWS server. The server has since been taken down. Read More ▶ |
| Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More ▶ |
| New security features and limits on what you can load and customize promise to make Microsoft Windows 10 S the more secure version ever. It might not be for everyone, though. Read More ▶ |
| | Researchers devise new two new attacks -- voice squatting and voice masquerading -- on Amazon Alexa and Google Home, allowing adversaries to steal personal information or silently eavesdrop. Read More ▶ |
| The Telegram messaging app has grown in popularity since its launch in 2013, but not without controversy. Read More ▶ |
| Are you asking the right computer security questions? If you can answer these five, you'll know better how to secure your organization. Read More ▶ |
| White Paper: Palo Alto Networks As the leader and pioneer of the next-generation firewall category, Palo Alto Networks would like to share what we have learned from securing over 3,500 enterprise networks in the past few years. Download our guide that depicts the top 10 requirements you should demand in your next firewall purchase. Read More ▶ | CSO Insider | Editor's Picks |
|
|
|