Time's almost out for websites to abandon SHA-1

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

Dec 01, 2016
Featured Image

10 key security terms devops ninjas need to know

If devops teams are going to move fast without breaking security, they’ll need to learn key IT security concepts Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Time's almost out for websites to abandon SHA-1
Android malware steals access to more than 1 million Google accounts
The new Mirai malware strain has gone beyond Deutsche Telekom
CERT to Microsoft: Keep EMET alive
San Francisco's Muni says server data not accessed in ransomware hit

eGuide: A10 Networks

eGuide: The DDoS Security Threat

Distributed denial-of-service (DDoS) attacks continue to evolve. The attacks are getting bigger, and criminals are plotting longer campaigns. Moreover, if your enterprise has been hit by a DDoS, it is highly likely it will be hit again. The consequences? The availability of network and application resources are threatened, and your enterprise could lose data, revenue, and customers. Not to mention damage to your brand. Read More

Thumbnail Image

Time's almost out for websites to abandon SHA-1

One-third of all websites still rely on the insecure SHA-1 encryption algorithm, as the deadline to switch draws closer Read More

Thumbnail Image

Android malware steals access to more than 1 million Google accounts

The Gooligan malware targets devices running older versions of Android Read More

Thumbnail Image

The new Mirai malware strain has gone beyond Deutsche Telekom

Hackers attacked routers in the United Kingdom, Brazil, Iran, Thailand, and other countries Read More

Thumbnail Image

CERT to Microsoft: Keep EMET alive

Windows systems with Enhanced Mitigation Experience Toolkit properly configured is more secure than a standalone Windows 10 system, says CERT Read More

Thumbnail Image

San Francisco's Muni says server data not accessed in ransomware hit

The alleged ransomware attacker has reportedly threatened to release data stolen from the transit system Read More

White Paper: J2 Global Communications

HIPAA, Cyber Hacking and ePHI Security

Analysis of the Department of Health and Human Services data suggests that in 2016, the healthcare industry has suffered four data breaches per week so far, while the private research firm IDC has estimated that one in three healthcare patients can expect to have their medical records and other ePHI breached by cybercriminals in 2016. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.