Old attack code is new weapon for Russian hackers

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

Apr 04, 2017
Featured Image

Want privacy? Congress says you'll have to pay for it

What to expect after the repeal of FCC broadband privacy rules: Hackers, VPNs, and a privacy tax, for starters Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Old attack code is new weapon for Russian hackers
Silicon Valley weighs speed versus risk in app dev
Mozilla project keeps compromised apps out of circulation
Update now! Microsoft unloads Windows and Office patches for March
What you should really expect from Samsung’s facial recognition

White Paper: Lookout Mobile Security

Are You Prepared? The Future of Enterprise Mobile Security

As threats to enterprise mobility continue to intensify, the mobile security industry is evolving quickly. In this report, Lookout co-founders John Hering and Kevin Mahaffey share their predictions for what important new changes are coming and how you can best prepare your organization for success. Read More

Thumbnail Image

Old attack code is new weapon for Russian hackers

Researchers found commonalities between tools used against Solaris 20 years ago and modern-day attacks deployed against Windows PCs Read More

Thumbnail Image

Silicon Valley weighs speed versus risk in app dev

A panel featuring Atlassian, GitHub, HackerOne, and Rainforest QA explores how to get successful software projects completed on time without breaking things Read More

Thumbnail Image

Mozilla project keeps compromised apps out of circulation

The Binary Transparency plan would use public certificate technology to guarantee binaries haven't been replaced with malicious counterparts Read More

Thumbnail Image

Update now! Microsoft unloads Windows and Office patches for March

With the most egregious bugs out of the way, now's a good time to get caught up on Microsoft's latest batch of fixes Read More

Thumbnail Image

What you should really expect from Samsung’s facial recognition

Biometrics is neither a silver bullet nor a foolish approach. The trick is to understand what you’re securing, and not pretend you’re getting more than you are Read More

White Paper: Lookout Mobile Security

Enterprise Mobile Security 101: Understanding the Basics

Read the eBook to learn the difference between securing mobility and mobile security, why Enterprise Mobility Management/ Mobile Device Management (EMM/ MDM) solutions alone are not security, and the kinds of attacks your mobile fleet might be facing. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.