Friday, February 26, 2016

Apple appeals order to unlock iPhone, says it would 'violate the Constitution'

Microsoft adds new security enhancements to its cloud offerings

Email not displaying correctly? View it in your browser.

Computerworld Security

Feb 26, 2016
Featured Image

Apple appeals order to unlock iPhone, says it would 'violate the Constitution'

Apple filed court papers on Thursday urging a judge to overturn an order requiring it to unlock an iPhone used by one of the shooters in last December's San Bernardino attacks. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Microsoft adds new security enhancements to its cloud offerings
FBI director says Apple encryption ruling could lead to more requests
Nissan apologizes, shutters mobile app that left Leaf EV hackable
With few options, companies pay hush money to data thieves
Report: 2016 phishing trends reveal new tricks, targets
Outdated payment terminals exempted by Mozilla from SHA-1 certificate ban

Solution Center: Hewlett Packard Enterprise

Hewlett Packard Enterprise Information Security Solution Center

Here is information and best practices you need to understand the threat, to protect your business, and to achieve the compliance your industry requires. Hewlett Packard Enterprise ArcSight provides the clarity you need to act now. Read More

Thumbnail Image

Microsoft adds new security enhancements to its cloud offerings

Microsoft is adding a range of new security features to its Office 365 and Azure cloud services as part of the company's holistic approach to enterprise security that it announced last year. Read More

Thumbnail Image

FBI director says Apple encryption ruling could lead to more requests

If a U.S. court grants the FBI's request for Apple to help it unlock a terrorism suspect's iPhone, the case will likely open the door to many similar law enforcement requests, the agency's director said Thursday. Read More

Thumbnail Image

Nissan apologizes, shutters mobile app that left Leaf EV hackable

Nissan has pulled a mobile app that allowed drivers to control non-critical features on their Leaf EVs because the app also let hackers with a VIN to access any car. Read More

Thumbnail Image

With few options, companies pay hush money to data thieves

There's a disturbing new angle to cyberattacks that has become more common over the last year, and it is proving costly for organizations: extortion. Read More

Thumbnail Image
INSIDER

Report: 2016 phishing trends reveal new tricks, targets

Top targets, domains and webmail services used by attackers, and a changing business model. Read More

Thumbnail Image

Outdated payment terminals exempted by Mozilla from SHA-1 certificate ban

Mozilla will allow Symantec to issue nine new SHA-1-signed certificates to Worldpay in order to accommodate over 10,000 payment terminals that haven't been upgraded before the issuing of such certificates was banned. Read More

Solution Center: Hewlett Packard Enterprise

Software Security Assurance Solution Center

Discover the components of an effective SSA program and how Hewlett Packard Enterprise Fortify can help you cost-effectively achieve your application security goals. Read More

Transformation That's All About the Customer

Check out our February Digital Magazine, with a cover story on how organizations are focusing their re-engineering efforts on customer demands. Also inside: How humanitarian groups are using big data to improve response efforts, and the pros and cons of an open-source career. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive