Wednesday, May 24, 2017

Security researchers fight back against WannaCry with ransomware decryptor

Security Digest
Information security news and advice from TechTarget's network | May 24, 2017
TechTarget
FEATURED STORY
WannaCry ransomware decryptor brings hope to victims
by Michael Heller, Senior Reporter

Security researchers uncovered more info on how WannaCry spread, and a ransomware decryptor emerged to save files for those affected. (SearchSecurity.com)

Advertisement
NEWS
 
Vulnerability remediation of WannaCry flaw raises concerns

Between patch delays and NSA disclosure issues, experts said the vulnerability remediation for WannaCry was poorly handled and caused more damage. (SearchSecurity.com)

 
Q&A: Time to get GDPR compliant, CSPi's Gary Southwell says

Companies doing business in EU face challenge to get GDPR compliant as enforcement of the strict new General Data Protection Regulation is just one year away. (SearchSecurity.com)

 
Q&A: Juniper's Kevin Walker on data manipulation, ransomware threats
Juniper's Kevin Walker talks with SearchSecurity about the evolving threat landscape and how some attackers are incorporating data manipulation into their schemes. (SearchSecurity.com)
 
 
 

Vulnerabilities Equities Process may be law with PATCH Act

The bipartisan PATCH Act aims to codify the Vulnerabilities Equities Process into law in the wake of a global ransomware attack based on a stolen NSA cyberweapon. (SearchSecurity.com)

 
Google Play Protect looks to bolster Android app security
News roundup: The new Google Play Protect system aims to improve Android app security. Plus, Google Cloud IoT Core adds layer of device security, and more. (SearchSecurity.com)
 
Risk & Repeat: WannaCry ransomware worm shakes tech industry
In this week's Risk & Repeat podcast, SearchSecurity editors look at the devastation caused by the WannaCry ransomware worm and discuss how it could have been prevented. (SearchSecurity.com)
 
 
 
EXPERT ADVICE
 
Cognitive hacking: Understanding the threat of bad data

Bad data can create more than just 'fake news.' Expert Char Sample explains how cognitive hacking and weaponized information can undermine enterprise security. (SearchSecurity.com)

 
How DevOps tools can be used to integrate cloud automation
DevOps tools can be used to deploy secure cloud automation. Expert Dave Shackleford looks at how this works and which tools are the best bet for DevSecOps. (SearchCloudSecurity.com)
 
 
 
 

What the end of hot patching mobile apps means for enterprise security

Apple now restricts mobile app developers from using hot patching, as the technique can change app behavior after it is reviewed. Expert Kevin Beaver goes over enterprise concerns. (SearchSecurity.com)

 
Switcher Android Trojan: How does it attack wireless routers?

The Switcher Trojan spreads to Android devices through the wireless router to which they are connected. Expert Nick Lewis explains how this attack is carried out. (SearchSecurity.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved.
TechTarget

No comments: