Free search engine tool hunts down malware-infected computers

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

May 04, 2017
Featured Image

Microsoft’s novel approach to securing IoT

Project Sopris looks to create a set of secure layers that protect both hardware and their communications, and it can refresh a compromised device Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Free search engine tool hunts down malware-infected computers
Android patches critical flaws in media handling, hardware drivers
Vulnerability hits Intel enterprise PCs going back 10 years
10 'Star Wars' technologies that are almost here
Sneaky Gmail phishing attack fools with fake Google Docs app

White Paper: Veriato Inc

3 Steps to Protect Your Data During The High Risk Exit Period

Someday, sometime, an employee with access to sensitive data, intellectual property, or trade secrets is going to leave your company, which makes their departure risky to the organization. Sure, you've "trusted" them as part of their employment, but when the time comes to change jobs, you can't always be certain about the motive for the move. Read More

Thumbnail Image

Free search engine tool hunts down malware-infected computers

Shodan is now offering the Malware Hunter scanning tool, which uncovers systems manipulated to control malware-infected devices Read More

Thumbnail Image

Android patches critical flaws in media handling, hardware drivers

The Android security bulletin for May covered fixes for over 100 vulnerabilities Read More

Thumbnail Image

Vulnerability hits Intel enterprise PCs going back 10 years

The security hole involves enterprise IT remote management features in the chipmaker’s firmware Read More

Thumbnail Image

10 'Star Wars' technologies that are almost here

Lightsabers, landspeeders, protocol droids -- the Force is stronger in today's research labs than you might think Read More

Thumbnail Image

Sneaky Gmail phishing attack fools with fake Google Docs app

Russian hackers resorted to a similar method to abuse the OAuth protocol to phish user accounts Read More

White Paper: Veriato Inc

4 Steps to Reduce the Risk of Malicious Insider Activity

The risk of malicious activity has never been more of a reality for organizations. End users today access, process, and manage privileged data more than ever as part of their job. This need for employees to use privileged data puts the organization at risk of malicious actions that include data theft, destruction, manipulation, and ransom. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.