Supply chain attack hits Mac users of HandBrake video converter app

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

May 09, 2017
Featured Image

US device searches at borders ignite resistance

In CBP's fiscal year 2015, the agency searched just 8,503 devices during 383.2 million border crossings. But in fiscal year 2016, the number of device searches jumped to 19,033, and in the first six months of FY2017, CBP searched 14,993 devices, putting the agency on pace to search nearly 30,000 devices for the year. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Supply chain attack hits Mac users of HandBrake video converter app
25% off YETI Rambler 20 oz Stainless Steel Vacuum Insulated Tumbler with Lid - Deal Alert
Security among the hot jobs of the future
German firms will streamline online login with a European bent
Teenagers who became hackers
Women in cybersecurity need to take more risks

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

Supply chain attack hits Mac users of HandBrake video converter app

Hackers compromised a download server for HandBrake, a popular open-source program for converting video files, and used it to distribute a macOS version of the application that contained malware. Read More

Thumbnail Image
DealPost

25% off YETI Rambler 20 oz Stainless Steel Vacuum Insulated Tumbler with Lid - Deal Alert

The Rambler 20 oz. bottle is next-level, and the perfect addition to your rough commutes, day hikes, or kayak sessions. Features a no-sweat design and tough 18/8 stainless steel construction. Yeti has over-engineered these double-wall insulated tumblers to ensure your drink still keeps its temperature no matter how much of a beating this cup takes. Read More

Thumbnail Image
INSIDER

Security among the hot jobs of the future

It is clear that new technologies like robotics, self-driving cars, 3D printing, drones, artificial intelligence and virtual reality will create major upheavals in all sorts of labor markets, not just technology. (Think self-driving cars and taxi drivers.) So what are the jobs of the future? And how can you prepare for them? Read More

Thumbnail Image

German firms will streamline online login with a European bent

Several German firms are taking a stab at a single login process for accessing different online services -- an approach that could compete with U.S. offerings. Read More

Thumbnail Image

Teenagers who became hackers

There is of course a very long history of young people getting involved in hacking—it's become almost something of a cliché. We'll take a look at the trouble teens have managed to get into online since almost the beginning of "online" as a concept. Read More

Thumbnail Image

Women in cybersecurity need to take more risks

Projecting confidence and taking risk are keys to success for women in cyber Read More

White Paper: Cybereason

2017 Threat Hunting Survey Report

Many organizations realize that threat hunting is the next step in the evolution of the modern Security Operations Center (SOC). To gain more insights on the state of threat management in SOCs, Cybereason commissioned an online survey of over 330 cybersecurity and IT professionals. Read More

Top 5 Stories

1. Making sense of cybersecurity qualifications
2. Third parties leave your network open to attacks
3. Job seekers beware of recruiters
4. Recent Google Docs Phishing attack is a win for Blue Teams
5. What's the key to surviving as a cyber-security start-up?

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.