Thursday, March 24, 2016

Ransomware targets Flash and Silverlight vulnerabilities

Pwn2Own contest highlights renewed hacker focus on kernel issues

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

Mar 24, 2016
Featured Image

Ransomware targets Flash and Silverlight vulnerabilities

As Angler and other exploit kits aim for recently patched Flash and Silverlight flaws, it's a reminder to stay on top of patches Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Pwn2Own contest highlights renewed hacker focus on kernel issues
The dirty dozen: 12 cloud security threats
New exploit spotlights Android's Stagefright vulnerability
Google makes BinDiff code analysis plug-in available for free

Video/Webcast: Check Point Software Technologies Ltd.

A New Model for Security Management

Join us live April 5th @11:00 AM EDT for this webcast to understand the trends that are disrupting the way security is managed today. Read More

Thumbnail Image

Pwn2Own contest highlights renewed hacker focus on kernel issues

Hackers have used 21 new vulnerabilities in their attacks against browsers and operatings systems during this year's Pwn2Own hacking contest. Read More

Thumbnail Image

The dirty dozen: 12 cloud security threats

Introducing the 'Treacherous 12,' the top security threats organizations face when using cloud services Read More

Thumbnail Image

New exploit spotlights Android's Stagefright vulnerability

If Android manufacturers don't step up on their patching timeline, this could be a serious problem Read More

Thumbnail Image

Google makes BinDiff code analysis plug-in available for free

The valuable security tool for analyzing malware variants can now be downloaded for free from the Zynamics website Read More

White Paper: SecureAuth

SecureAuth Bolsters Threat Detection with BehavioSec Partnership

SecureAuth is pushing the limits of Adaptive Authentication by introducing behavioral biometrics. Behavioral biometrics is another method for detecting threats with the ability to monitor and analyze keystrokes, mouse movements, and touch dynamics. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive