Network World Security Alert |
| |
|
Engineers from Google, Microsoft, Yahoo, Comcast, LinkedIn and 1&1 have devised a new mechanism that improves the encryption of email traffic. Read More ▶ |
|
| Video/Webcast: Check Point Software Technologies Ltd. Join us live April 5th @11:00 AM EDT for this webcast to understand the trends that are disrupting the way security is managed today. Read More ▶ | Apple and the U.S. Department of Justice will argue in court Tuesday about whether a judge should require the tech giant help the FBI unlock an iPhone used by a mass shooter in California. Read More ▶ |
| A Johns Hopkins team has decrypted iMessage photos by guessing character-by-character the key used to encrypt it, and Apple plans to release a new iOS version today that will fix the flaw. Read More ▶ |
| The battle over iPhone encryption began 18 months ago, Bloomberg reports. Read More ▶ |
| | Hackers have used 21 new vulnerabilities in their attacks against browsers and operatings systems during this year's Pwn2Own hacking contest. Read More ▶ |
| CISOs must plan for expansive cloud growth AND a lack of cybersecurity professionals with cloud computing skills Read More ▶ |
| White Paper: SecureAuth SecureAuth is pushing the limits of Adaptive Authentication by introducing behavioral biometrics. Behavioral biometrics is another method for detecting threats with the ability to monitor and analyze keystrokes, mouse movements, and touch dynamics. Read More ▶ | Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ | SLIDESHOWS How to respond to ransomware threats Read More ▶ | Most-Read Stories |
|
|
|