Certain HP laptops are found recording users' keystrokes

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

May 12, 2017
Featured Image

Mixed reviews for Trump’s Executive Order on cybersecurity

Experts generally agree that President Trump’s cybersecurity Executive Order is well intended and a good start. But several of them have specific suggestions on how it could be improved. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Certain HP laptops are found recording users' keystrokes
39% off Exploring Raspberry Pi: Interfacing to the Real World with Embedded Linux, Paperback - Deal Alert
Another IoT botnet with pieces of Mirai embedded can do DDoS from 100k devices
Worldwide threat assessment - The Director National Intelligence's view
Kevin Mitnick performs hacking tricks, live on Wall Street
What not to get Mom for Mother’s Day
Latest firmware updates for Asus routers fix CSRF security flaws

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

Certain HP laptops are found recording users' keystrokes

Over two dozen HP laptop models may have secretly been recording users’ keystrokes by mistake, according to a Swiss security firm. Read More

Thumbnail Image
DealPost

39% off Exploring Raspberry Pi: Interfacing to the Real World with Embedded Linux, Paperback - Deal Alert

The innovators guide to bringing Raspberry Pi to life. This book favors engineering principles over a 'recipe' approach to give you the skills you need to design and build your own projects. You'll understand the fundamental principles, using a "learning by doing" approach that caters to both beginners and experts. Read More

Thumbnail Image

Another IoT botnet with pieces of Mirai embedded can do DDoS from 100k devices

Bot-herding software called Persirai, which incorporates pieces of the Mirai botnet code, can commandeer significant chunks of a known 150,000 IP cameras that are vulnerable to Mirai and use them to fire off distributed denial-of-service attacks. Read More

Thumbnail Image

Worldwide threat assessment - The Director National Intelligence's view

Director National Intelligence presented his state of the global threats to the United States to the US Senate Select Committee on Intelligence. Read More

Thumbnail Image

Kevin Mitnick performs hacking tricks, live on Wall Street

The second annual Cyber Investing Summit, held on Wall Street at the New York Stock Exchange, announced that Kevin Mitnick, the world's most famous hacker, will be its opening act on May 23, 2017. Read More

Thumbnail Image

What not to get Mom for Mother’s Day

With Mother’s Day just a few days away, this is the day that you thank your Mom for her love and support. … But don’t thank her with a gift card. Read More

Thumbnail Image

Latest firmware updates for Asus routers fix CSRF security flaws

Users of Asus RT-N and RT-AC series routers should install the latest firmware updates released for their models because they address vulnerabilities that could allow attackers to hijack router settings. Read More

Video/Webcast: CDW | EMC

Digital Transformation Calls for New Data Center Solutions

We're in the midst of the third industrial revolution -- the era of digital business. Big data analytics and the Internet of Things are giving rise to new digital business strategies. In this webcast, you will learn how converged infrastructure, built on such technologies as virtualization and flash storage, is enabling businesses to successfully achieve digital transformation. Read More

Top 5 Stories

1. Making sense of cybersecurity qualifications
2. Third parties leave your network open to attacks
3. Job seekers beware of recruiters
4. Recent Google Docs Phishing attack is a win for Blue Teams
5. What's the key to surviving as a cyber-security start-up?

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as [email protected].

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to [email protected].