A better way to move past insecure SH-1 encryption

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

Jan 05, 2016

Endpoint modeling: A new way to look at IT security

Real-world realities such as end-to-end encryption, device proliferation, and increasing attacker sophistication call for a new approach to securing our networks Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

A better way to move past insecure SH-1 encryption
Win10 Flash patch KB 3132372 breaks Skype, HP Solutions Center, Incredimail, games
HP tackles 'visual hacking' with privacy filters in laptop, tablet screens
Google fixes another Mediaserver bug in monthly Android security update

White Paper: Sophos Inc

Deciphering the Code: A Simple Guide to Encryption

This whitepaper provides an overview of encryption, things to consider when planning an encryption strategy and what to look out for when choosing an encryption solution. Read More

Thumbnail Image

A better way to move past insecure SH-1 encryption

The digital certificate switchover from weak SHA-1 encryption to the vastly stronger SHA-2 promises to be brutal, but a new industry proposal could ease the pain Read More

Thumbnail Image

Win10 Flash patch KB 3132372 breaks Skype, HP Solutions Center, Incredimail, games

Skype responded quickly by disabling Flash, but other problems still linger Read More

Thumbnail Image

HP tackles 'visual hacking' with privacy filters in laptop, tablet screens

HP wants to prevent Peeping Toms from stealing data with new privacy filters integrated in laptops Read More

Thumbnail Image

Google fixes another Mediaserver bug in monthly Android security update

Mediaserver continues to be in the limelight as Google patches yet another critical vulnerability in how Android processes media files Read More

White Paper: Sophos Inc

Encryption Buyers Guide

This guide details the capabilities to look for when evaluating endpoint encryption solutions. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as tuwanan.mono@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.