Monster Oracle update patches database, Java

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

Oct 20, 2016
Featured Image

Stupid encryption mistakes criminals make

Blown cover: Malware authors show how easy it is to get encryption wrong and, in the process, help security pros crack their code Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Monster Oracle update patches database, Java
VeraCrypt fixes bugs uncovered in security audit
Microsoft previews telemetry push with new Win7/8.1 patches KB 3192403, 3192404
Yahoo asks US government for clarity on email scanning controversy
Flaw in Intel CPUs could help attackers defeat ASLR exploit defense

White Paper: Veracode

Gartner Magic Quadrant for Application Security Testing

Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Read More

Thumbnail Image

Monster Oracle update patches database, Java

Oracle's Critical Patch Updates keep getting bigger. The database giant addressed a number of remotely exploitable flaws in Java, MySQL, and Oracle Database this quarter Read More

Thumbnail Image

VeraCrypt fixes bugs uncovered in security audit

Security audit for full-disk encryption tool VeraCrypt found vulnerabilities, but they have already been addressed in VeraCrypt 1.19 Read More

Thumbnail Image

Microsoft previews telemetry push with new Win7/8.1 patches KB 3192403, 3192404

Microsoft plans to roll out major extensions to its Diagnostic and Telemetry service in November Read More

Thumbnail Image

Yahoo asks US government for clarity on email scanning controversy

The company asks Director of National Intelligence James Clapper to provide information about the government's request that Yahoo secretly scan customer emails Read More

Thumbnail Image

Flaw in Intel CPUs could help attackers defeat ASLR exploit defense

A feature in Intel's Haswell CPUs can be abused to reliably defeat an anti-exploitation technology that exists in all major operating systems, researchers have found. Read More

White Paper: Veracode

How IT Professionals are Approaching Appsec Today

The application security landscape is changing significantly - almost on a daily basis. Threats specifically targeting users and applications are on the rise, and the lines between traditional organizational IT infrastructure and Web and mobile are dissolving. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.