What I learned playing prey to Windows scammers

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

Jul 07, 2016
Featured Image

Google fixes over 100 flaws in Android, many in chipset drivers

Manufacturers can choose between two patch levels, one dedicated to device-specific fixes Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What I learned playing prey to Windows scammers
New Tor-powered backdoor program targets Macs
Four new Windows patches to avoid: KB 2952664, 2976978, 2977759, and Windows Journal 3170735
The upside of overhyped security threats
Symantec bugfest highlights the dangers of security software

Video/Webcast: Okta

Live Webcast 7/12/16: Automating the Identity Lifecycle with Okta Provisioning

Increasingly companies are employing cloud solutions as the foundation for running their business. Okta builds on that foundation with a full suite of identity, mobility and security products that are all fully integrated into one platform for internal and external users. Read More

Thumbnail Image

What I learned playing prey to Windows scammers

Three months of phone calls prove Windows scammers are more skilled at social engineering than you think Read More

Thumbnail Image

New Tor-powered backdoor program targets Macs

The Eleanor malware allows attackers to execute commands and scripts, steal and modify files and take pictures using the webcam Read More

Thumbnail Image

Four new Windows patches to avoid: KB 2952664, 2976978, 2977759, and Windows Journal 3170735

There are signs that Windows Journal -- a massive security hole in Windows -- is about to get the axe Read More

Thumbnail Image

The upside of overhyped security threats

Check your Office 365 security settings before you cave in to (or blow off) security vendor FUD Read More

Thumbnail Image

Symantec bugfest highlights the dangers of security software

Vulnerabilities exist in all software applications, but in some cases, security software has worse flaws than the average application Read More

White Paper: Webroot Software

A Guide to Avoid Being a Crypto-Ransomware Victim

This guide will examine a number of mitigation strategies that will help protect your organizations' data from crypto-ransomware attacks. Crypto-ransomware is no longer an annoyance. It's a highly persistent and organized criminal activity with Ransomware as a Service (RaaS) at its core. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.