Tuesday, December 1, 2015

4 do's and don'ts for safer holiday computing

Dell debacle reveals widespread ignorance on security certificates.

Node.js discloses two critical security vulnerabilities.

InfoWorld Security Report
December 01, 2015
featured image

4 do's and don'ts for safer holiday computing

It's the season for scams, hacks, and malware attacks. But contrary to what you've heard, you can avoid being a victim pretty easily. READ MORE

Twitter Facebook LinkedIn
 

Issue highlights

1. Dell debacle reveals widespread ignorance on security certificates

2. Node.js discloses two critical security vulnerabilities

3. Warning: Internet security turbulence ahead

4. Millions of embedded devices use the same hard-coded SSH and TLS private keys

5. Microsoft enables potential unwanted software detection for enterprise customers

: Neustar Inc

6 Threats to Holiday Website Shopping

There are threats to online shopping every day of the year. The holidays, of course, simply magnify the risks. The buying path is strewn with threats. Sometimes the enemy is you. Find out more in the eBook. Learn More

Dell debacle reveals widespread ignorance on security certificates

Dell pre-installing eDellRoot on Windows machines shows that even the world's largest PC maker doesn't understand how certificates and keys function. READ MORE

Node.js discloses two critical security vulnerabilities

The Node.js Foundation revealed a denial-of-service and an out-of-bounds access issue and said that fixes will come next week. READ MORE

Warning: Internet security turbulence ahead

As Internet growth approaches hyperspeed, security will get worse before it gets better. READ MORE

Millions of embedded devices use the same hard-coded SSH and TLS private keys

Keys hard-coded in thousands of routers, modems, IP cameras, VoIP phones and other devices can be used to launch man-in-the-middle attacks. READ MORE

Microsoft enables potential unwanted software detection for enterprise customers

Sysadmins can now turn on the feature in System Center Endpoint Protection and Forefront Endpoint Protection. READ MORE

White Paper: LogRhythm

SIEM Critical Capabilities Report

"Critical capabilities" are attributes that differentiate products/services in a class in terms of their quality and performance. Gartner recommends that users consider the set of critical capabilities as some of the most important criteria for acquisition decisions. Learn More

GET THE DEEP TECHNOLOGY INSIGHTS YOU NEED

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO, Network World, CSO, ITworld, and other IDG Enterprise publications.

Sign up at no cost today!

Follow InfoWorld

Twitter Facebook LinkedIn Google+

You are currently subscribed to infoworld_sec_rpt as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@infoworld.com

Copyright © 2015 InfoWorld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@infoworld.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 2:51 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive