Wednesday, November 8, 2017

Apple iOS 11 hacked via multiple vulnerabilities at Mobile Pwn2Own 2017

Security Digest
Information security news and advice from TechTarget's network |November 8, 2017
TechTarget
FEATURED STORY
Researchers hack iOS 11 at Mobile Pwn2Own 2017
by Michael Heller, Senior Reporter

Security researchers competing at Mobile Pwn2Own 2017 used multiple vulnerabilities to hack iOS 11 in order to execute code and win prizes. (SearchSecurity.com)

Advertisement
NEWS
 
Fake WhatsApp app downloaded 1 million times

A fake WhatsApp app bypassed Google's Play Store checks and was downloaded 1 million times, but one expert said Google's store is still the safest place to get apps. (SearchSecurity.com)

 
Certificate authority business undergoes major changes

News roundup: Comodo and Symantec sales signal important changes in the certificate authority business. Plus, an Oracle vulnerability gets a CVSS score of 10.0, and more. (SearchSecurity.com)

 
 
 

SAVE Act attempts to bolster election security

Two senators introduced a bipartisan election security bill called the SAVE Act, which aims to improve voting infrastructure and harden state systems against attack. (SearchSecurity.com)

 
Risk & Repeat: Responsible encryption ramps up
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the recent push from law enforcement officials for responsible encryption and what that may mean. (SearchSecurity.com)
 
 
 
EXPERT ADVICE
 
Are security operations centers doing enough?

SOCs are maturing, but organizations facing the increased threat landscape understand that improving their effectiveness must be a priority in the year ahead. (SearchSecurity.com)

 
 
The vulnerability management process after Equifax
Cataclysmic security incidents highlight the importance of a vulnerability management program versus a patch management system. Here's how to implement a risk-based approach. (SearchSecurity.com)
 
 
 

Understanding VM escape vulnerabilities and how to avoid them

In the last couple of years, VM escape vulnerabilities have popped up and caused problems for enterprises that rely on the cloud. Expert Ed Moyle explains how to handle these issues. (SearchCloudSecurity.com)

 
Monitoring employee communications: What do EU privacy laws say?

The European Court of Human Rights recently placed strict regulations on monitoring employee communications. Matt Pascucci compares EU privacy laws to the U.S.'s standards. (SearchSecurity.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved.
TechTarget

No comments: