10 reasons why phishing attacks are nastier than ever.

Researchers find a fix for a Flash bug -- and future variants.

InfoWorld Security Report
November 12, 2015
featured image

Don't secure Microsoft systems by Microsoft alone

Why 'defense in depth' would still make sense if Microsoft's security tools were as good as the competition. READ MORE

Twitter Facebook LinkedIn
 

Issue highlights

1. 10 reasons why phishing attacks are nastier than ever

2. Researchers find a fix for a Flash bug -- and future variants

3. IDG Contributor Network: Securing big data, a cross-technology challenge

: Citrix Systems

eGuide: Mobile Security

In this eGuide, IDG News Service, CSO, Computerworld and InfoWorld offer news, commentary and advice about how to successfully launch and maintain mobile strategies. Read on to learn how to make mobile devices manageable and secure in your organization. Learn More

10 reasons why phishing attacks are nastier than ever

Forget Nigerian princes -- today's spearphishing is sophisticated business, fooling even the most seasoned security pros. READ MORE

Researchers find a fix for a Flash bug -- and future variants

Endgame Security researchers have identified a new mitigation technique to block use-after-free bugs similar to the one Adobe patched recently. READ MORE

IDG Contributor Network: Securing big data, a cross-technology challenge

With all this valuable data in a single place, there are many reason why hackers are going after the data lake. Securing big data is a real challenge, but one that needs to be addressed properly. READ MORE

Resource compliments of: Citrix

Mobile security focused seminars coming to a city near you!

During this seminar, you'll learn how to protect your data on your BYO and company owned devices from the latest mobile security threats, provide mobile users secure access to files while complying with regulations, prevent data loss, minimize the risk of hackers accessing your network through malicious mobile apps and more. Join us to learn how you can protect apps and data and mitigate security threats with Citrix. Save your seat! Register today.

GET THE DEEP TECHNOLOGY INSIGHTS YOU NEED

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO, Network World, CSO, ITworld, and other IDG Enterprise publications.

Sign up at no cost today!

Follow InfoWorld

Twitter Facebook LinkedIn Google+

You are currently subscribed to infoworld_sec_rpt as tuwanan.mono@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@infoworld.com

Copyright © 2015 InfoWorld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@infoworld.com. **