Tuesday, June 30, 2015

4 fatal problems with PKI

Microsoft quietly pushes 17 new trusted root certificates to all Windows systems.

Software developers are failing to implement crypto correctly, data reveals.

InfoWorld Security Report
June 30, 2015
featured image

4 fatal problems with PKI

The Web's security runs on complicated PKI deployments, few of which are implemented correctly, and all of which will soon be at the mercy of Moore's Law READ MORE

Twitter Facebook LinkedIn
 

Issue highlights

1. Microsoft quietly pushes 17 new trusted root certificates to all Windows systems

2. Software developers are failing to implement crypto correctly, data reveals

3. Report: Clickfraud malware a gateway to other threats

White Paper: Damballa

New Weapons Offer Hope Against Advanced Cyber Attacks

One of the most frightening things about modern cyber-attacks is that a breach can remain undetected within networks for weeks, months or even years. This time gives hackers the luxury of compromising more systems and extracting information. Learn More

Microsoft quietly pushes 17 new trusted root certificates to all Windows systems

The aging foundation of Certificate Authorities shows yet another crack as security experts are caught unaware READ MORE

Software developers are failing to implement crypto correctly, data reveals

Lack of specialized training for developers and crypto libraries that are too complex lead to widespread encryption failures READ MORE

Report: Clickfraud malware a gateway to other threats

Malware that secretly clicks on ads to defraud advertisers might seem generally harmless, but is often just the first invader of a potentially long chain of more serious infections READ MORE

White Paper: ATTO Technology, Inc

Cut Costs & Boost Performance with Software Defined Storage

A transition is underway from standard data center infrastructures to cloud-enabled, software-defined ones that permit resources to be scaled in response to evolving business needs. Software Defined Storage (SDS) brings the benefits of virtualization to storage infrastructure by enabling a modular approach that abstracts software from hardware. Learn More

GET THE DEEP TECHNOLOGY INSIGHTS YOU NEED

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO, Network World, CSO, ITworld, and other IDG Enterprise publications.

Sign up at no cost today!

Follow InfoWorld

Twitter Facebook LinkedIn Google+

You are currently subscribed to infoworld_sec_rpt as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@infoworld.com

Copyright © 2015 InfoWorld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@infoworld.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:59 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive