|
White Paper: Lookout Mobile Security As threats to enterprise mobility continue to intensify, the mobile security industry is evolving quickly. In this report, Lookout co-founders John Hering and Kevin Mahaffey share their predictions for what important new changes are coming and how you can best prepare your organization for success. Read More ▶ |
Developers who publish their code on GitHub have been targeted in an attack campaign that uses a little known but potent cyberespionage malware. Read More ▶ | |
A proof-of-concept exploit has been published for a zero-day vulnerability in Microsoft Internet Information Services 6.0, a version of the web server that's no longer supported. Read More ▶ | |
|
Google has updated Chrome to patch several vulnerabilities, including a bug in the browser's JavaScript engine that a Chinese team tried to exploit at Pwn2Own. Read More ▶ | |
They're an example of big tech companies' failure to take security seriously. Read More ▶ | |
The government may soon allow your ISP to sell your browsing data. Here's how to fight back. Read More ▶ | |
VMware has released critical security patches for vulnerabilities demonstrated during the recent Pwn2Own hacking contest that could be exploited to escape from the isolation of virtual machines. Read More ▶ | |
President Donald Trump is extending by one year special powers introduced by former President Barack Obama that allow the government to issue sanctions against people and organizations engaged in significant cyberattacks and cybercrime against the U.S. Read More ▶ | |
When members of Congress approved a resolution that would toss out significant online privacy protections, one Internet user decided to do something about it. Read More ▶ | |
The Russian government used "thousands" of internet trolls and bots to spread fake news, in addition to hacking into political campaigns leading up to the 2016 U.S. election, one senator said. Read More ▶ | |
White Paper: Lookout Mobile Security Read the eBook to learn the difference between securing mobility and mobile security, why Enterprise Mobility Management/ Mobile Device Management (EMM/ MDM) solutions alone are not security, and the kinds of attacks your mobile fleet might be facing. Read More ▶ |
The 2017 IT Salary Survey results are in! Our annual survey shows steady pay increases -- but with predictions for IT spending and hiring all over the map, salaries could be in for a wild ride. You'll find our special report in the April issue of Computerworld's Digital Magazine, which also includes News Analysis, Opinion, Shark Tank, Security Manager's Journal, the Grill and Shark Tank -- all free for download with registration. View the magazine here ▶ |
Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶ |
Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now ▶ |
Search multiple listings now and get new job alerts as they are posted. Check them out now ▶ |
0 comments:
Post a Comment