Angler exploit kit may be dead, but malware lives on

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

Jul 12, 2016
Featured Image

Spotted! 9 signs of a malicious download

You've heard the advice: Don't download or run software you're unsure of. Here's a quick review of the warning signs to stop you from taking unnecessary risks Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Angler exploit kit may be dead, but malware lives on
Mozilla's Servo is an early step to making Firefox more secure
Google Chrome tests future of encryption with post-quantum crypto
Symantec bugfest highlights the dangers of security software
Serious flaw fixed in widely used WordPress plug-in

White Paper: PC Pitstop

Strong Security Needs Flexible Software Tools

It is being said that data security is back on top of the boardroom agenda for 2016. But the truth is it never actually went away. US companies need to figure out what to invest in to give themselves the best chance of avoiding breaches and data loss. And that is a decision which is far from easy given the constant onslaught from new and existing threats and the diverse range of security solutions designed to stop them. Read More

Thumbnail Image

Angler exploit kit may be dead, but malware lives on

The popular exploit kit behind sophisticated web-based attacks and malvertising is gone, but the bad guys will surely regroup with better crimeware tools Read More

Thumbnail Image

Mozilla's Servo is an early step to making Firefox more secure

The first step is a more secure rendering engine for Firefox. But after Servo, will Mozilla next rewrite SpiderMonkey in Rust? Read More

Thumbnail Image

Google Chrome tests future of encryption with post-quantum crypto

Google is testing a post-quantum cryptographic algorithm in Chrome Canary to improve the future of encrypted communications Read More

Thumbnail Image

Symantec bugfest highlights the dangers of security software

Vulnerabilities exist in all software applications, but in some cases, security software has worse flaws than the average application Read More

Thumbnail Image

Serious flaw fixed in widely used WordPress plug-in

The persistent XSS vulnerability could allow the hijacking of admin accounts Read More

Research/Infographic: PC Pitstop

Whitelisting: An Essential Component in Endpoint Security

For IT security professionals, malware threats are the stuff of nightmares. More than a quarter of respondents to a new survey from IDG Research report experiencing a "severe" impact from a virus and/or worm. And the definition of severe is enough to keep anyone awake at night. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.