This fake Pokemon Go game will secretly drive porn ad clicks

Email not displaying correctly? View it in your browser.

CSO

CSO Security Awareness Weekly

Jul 18, 2016
Featured Image

Pokemon Go: What security awareness programs should be doing now

Pokemon Go represents a tremendous security threat. As with all tremendous threats, it can also be your greatest opportunity. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

This fake Pokemon Go game will secretly drive porn ad clicks
Wearables could compromise corporate data
Legacy systems that security newbs need to watch
Companies failing to plan for many cyber dangers

Video/Webcast: EMA

Application Performance Management in the Digital Economy

The latest research on application performance management (APM) from leading IT analyst firm Enterprise Management Associates (EMA) is a deep dive into the trends and requirements driving investments in APM solutions and the outcomes companies experience when such solutions are put in place. Read More

Thumbnail Image

This fake Pokemon Go game will secretly drive porn ad clicks

A newly discovered fake Pokemon Go game will actually lock your phone and then secretly run in the background, clicking on porn ads. Read More

Thumbnail Image

Wearables could compromise corporate data

Smartwatches, fitness trackers and other wearable devices that are connected to corporate Wi-Fi networks could lead to serious privacy and security issues, experts say. Read More

Thumbnail Image

Legacy systems that security newbs need to watch

The systems that still work that can't be ignored. Read More

Thumbnail Image

Companies failing to plan for many cyber dangers

Only 22 percent of companies have a comprehensive plan in place to deal with major cybersecurity incidents, according to a new survey from KPMG and British Telecom. Meanwhile, 97 percent said they have been the victims of a digital attack, and 55 percent said that they have seen an increase in cyberattacks. Read More

White Paper: Dell Services

Getting the Enterprise Onboard with Digital Transformation

As the potent combination of mobile, social, cloud the Internet of Things (IoT), and big data/advanced analytics firmly takes shape, organizations are moving beyond tactical deployments of isolated technologies toward enterprise executions that aim for completed digital transformation. Read More

Top 5 Stories

1. Experts say Pokémon Go exposes players to security and privacy risks
2. Vicious new ransomware takes your money and still deletes your files
3. Apple devices held for ransom, rumors claim 40M iCloud accounts hacked
4. Killing the password: FIDO says long journey will be worth it
5. Market expansion adds to cybersecurity talent

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Security Awareness Weekly as [email protected].

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to [email protected].