ÃÛÌÒTV

Breaches 10-30-2015

This Month in SSL: October 2015

Mark Santamaria

Here is our latest news roundup of articles about network and SSL security. ( to see the whole series.)

SSL & Encryption News

  • Because of recent attacks on SHA-1, Mozilla explained in a recent Ìýthey are considering deprecating SHA-1 earlier than scheduled by .
  • The cost of resources necessary to , making it financially possible for cybercriminals to break it.
  • In an attempt to incentivize websites to move from HTTP to HTTPS, .
  • Researchers stateÌý. They suggest either 2048-bit encryption or elliptical curve cryptography as better options for staying secure.

Data Breaches

  • Cybercriminals breached Experian’s servers and accessed sensitive information for .
  • , affecting 3,500 of their subscribers. However, Dow Jones & Co. CEO has assured subscribers that as of yet there is no evidence that any data was stolen.
  • Law enforcement notified that hackers had breached their system between 2013 and 2014. The breach affects 4.6 million customers.
  • , the company confirmed. Trump Hotel Collection assured guests that no information had been stolen.

Vulnerabilities

  • Tavis Omandy, a Google researcher, . Kaspersky was quick to release patches for the vulnerabilities.
  • A security expert discovered a .

Malware

  • Ìýfunctioning the same as the real Chrome except for a few malicious, hidden capabilities.
  • that uses blackhat SEO techniques to boost visits to webpages containing malicious code.
  • with in-depth vetting process to ensure adspace is given to legitimate companies rather than malvertisers.

Healthcare

  • At the beginning of October, the specifying how medical information should be shared between healthcare providers, insurance companies, and patients.
  • Accenture released a over the next five years because of cybercrime.
  • Regardless of healthcare data breaches, .

Mobile

  • An allows hackers to trick users into visiting spoofed web pages.

Research & Studies

  • A survey of cybersecurity professionals shows that .
  • than previously thought a new study indicates.
  • A study found that . The same study illustrates that social engineering was one of the most used methods cybercriminals used to gain entry to an organization’s network.
  • The in 2015.
  • each year, which is 20% more than last year.
UP NEXT
PKI

3 Surprising Uses of PKI in Big Companies and How to Ensure They Are all Secure

5 Min

Featured Stories

07-03-2024

What is a CA’s Role in delivering digital trust?

11-27-2024

6 actionable ways to secure the IIoT at every stage

Tracking the progress toward post-quantum cryptography

The state of PQC since the publication of FIPS 203, 204 and 205