SearchSecurity

New & Notable

News

Adobe's new twist on bug bounty programs: No cash for bug hunters

News roundup: Bug bounty programs can offer big rewards to researchers, unless Adobe is handing out the prizes. Plus: Signal 2.0 encryption app; app cloning risk increasing; Angler adopts 'domain shadowing' capability.

Evaluate

What Apple Pay tokenization means for PCI DSS compiance

Tokenization is a key technology underlying Apple Pay, promising to boost payment data security. Mike Chapple examines how Apple Pay's tokenization system works, and whether it will provide any PCI DSS compliance relief.

News

Microsoft confirms Windows vulnerable to FREAK attack

The serious HTTPS FREAK exploit was thought to only affect Android, iOS, and MacOS, but Microsoft has confirmed that it also affects all supported versions of Windows.

Evaluate

How Shellshock transformed the future of shell security

The Shellshock Bash bug left millions of systems unsecure. Enterprise threats expert Nick Lewis discusses how the bug changed shell security for the better.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

View All Get Started

Sections from across SearchSecurity

  • News

    View All
  • Security patch management and Windows Patch Tuesday news

    Microsoft: FREAK vulnerability does affect Windows

    The serious HTTPS FREAK exploit was thought to only affect Android, iOS, and MacOS, but Microsoft has confirmed that it also affects all supported versions of Windows.

  • Business Management: Security Support and Executive Communications

    Threat experts warn against compliance-centric security

    While regulatory compliance is valuable and necessary for enterprise, cyberthreat experts say that a compliance-centric security strategy may leave organizations with few resources to ward off emerging cyberthreats.

  • China and US cross swords over software backdoors

    Barack Obama criticises Chinese plans to force tech firms trading in China to share encryption keys and put backdoors in software

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close