ÃÛÌÒTV

News 08-26-2016

This Month in SSL: August 2016

Mark Santamaria

Here is our latest news roundup of articles about network and SSL security. ( to see the whole series.)

SSL & Encryption

  • New research released at Black Hat USA 2016 revealed .

Data Breaches

  • A data breach Ìýemphasized the hidden danger of insider threats.
  • A hacker recently breached the , stealing almost 2 million forum members’ email addresses, usernames, and passwords.
  • AÌý gave hackers a backdoor into 27 million internet accounts.

Vulnerabilities

  • A dangerous could allow hijacking attacks on many popular websites, according to a group of researchers.
  • A security researcher discovered a vulnerability in that could allow MITM attacks.

Malware

  • A POS malware attack hit retailer , affecting 360 locations.

Cybercrime

  • Attackers use new method called to hijack online accounts.
  • Law enforcement arrested aÌý for extorting a total of $60 million from victims.
  • In order to obtain log in credentials, scammers targeted with phishing campaigns.

IoT

  • Well-known researcher returned to Black Hat USA 2016 to demonstrate by exploiting vulnerabilties.

Research & Studies

  • examined passwords compromised in a phishing attack and found that password habits have not improved.
  • An revealed that only 22% of businesses use password managers for storage and safekeeping.
  • 32% of hospitals transmit unencrypted data, according to a .
  • Kaspersky observed a in Q2 2016.
  • Almost half of organizations are not prepared to mitigate insider threats, says a new .
  • A study sponsored by Malwarebytes found that over in the last 12 months.
  • Researchers discovered that hackers can due to critical vulnerabilities in the operating software.
  • Researchers atÌýGoogle and Brigham Young University uncover some reasonsÌý.
UP NEXT
PKI

3 Surprising Uses of PKI in Big Companies and How to Ensure They Are all Secure

5 Min

Featured Stories

07-03-2024

What is a CA’s Role in delivering digital trust?

11-27-2024

6 actionable ways to secure the IIoT at every stage

Tracking the progress toward post-quantum cryptography

The state of PQC since the publication of FIPS 203, 204 and 205