App developers not ready for iOS transport security requirements

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

Dec 08, 2016
Featured Image
INSIDER

4 top disaster recovery packages compared

System administrators identify the best features — and what’s missing — in four leading software suites for disaster recovery Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

App developers not ready for iOS transport security requirements
3 clues to spotting a spam scam
Fighting ransomware: A fresh look at Windows Server approaches
Microsoft fixes Windows 7 'Group B' security-only patching method
Flash Player remains target of choice for exploit kits

White Paper: Keeper Security

Password Management Evaluation Guide for Businesses

Weak passwords are at the heart of the rise in cyber theft, causing 76% of data breaches. To mitigate this risk, businesses are adopting password management solutions. This is a comprehensive password management evaluation guide with recommended security, implementation and productivity requirements. Read More

Thumbnail Image

App developers not ready for iOS transport security requirements

Many iOS apps opt out of Apple's App Transport Security (ATS) feature or deliberately weaken it Read More

Thumbnail Image

3 clues to spotting a spam scam

The notice looked real at first -- but turned out to be an obvious scam. Unraveling its origins offered an object lesson in how not to get suckered Read More

Thumbnail Image
INSIDER

Fighting ransomware: A fresh look at Windows Server approaches

This electronic evil won't just fade away on its own. Here are a few things you can do Read More

Thumbnail Image

Microsoft fixes Windows 7 'Group B' security-only patching method

Great news: TechNet blog eschews fixing Win7/8.1 security-only bugs with monthly rollup patches Read More

Thumbnail Image

Flash Player remains target of choice for exploit kits

A recent report finds that six of the top 10 vulnerabilities target Flash Player as cybercriminals take advantage of irregular and slow patching schedules Read More

White Paper: Keeper Security

Why Your Business Needs Enterprise-Strength Password Management

This whitepaper discusses the emergence of the password as the primary authentication method in today's digital world and educates readers on authentication techniques, methodologies, technologies and best practices. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.