Here is our latest news roundup of articles about network and SSL security. ( to see the whole series.)
SSL & Encryption News
- Because of recent attacks on SHA-1, Mozilla explained in a recent Ìýthey are considering deprecating SHA-1 earlier than scheduled by .
- The cost of resources necessary to , making it financially possible for cybercriminals to break it.
- In an attempt to incentivize websites to move from HTTP to HTTPS, .
- Researchers stateÌý. They suggest either 2048-bit encryption or elliptical curve cryptography as better options for staying secure.
Data Breaches
- Cybercriminals breached Experian’s servers and accessed sensitive information for .
- , affecting 3,500 of their subscribers. However, Dow Jones & Co. CEO has assured subscribers that as of yet there is no evidence that any data was stolen.
- Law enforcement notified that hackers had breached their system between 2013 and 2014. The breach affects 4.6 million customers.
- , the company confirmed. Trump Hotel Collection assured guests that no information had been stolen.
Vulnerabilities
- Tavis Omandy, a Google researcher, . Kaspersky was quick to release patches for the vulnerabilities.
- A security expert discovered a .
Malware
- Ìýfunctioning the same as the real Chrome except for a few malicious, hidden capabilities.
- that uses blackhat SEO techniques to boost visits to webpages containing malicious code.
- with in-depth vetting process to ensure adspace is given to legitimate companies rather than malvertisers.
Healthcare
- At the beginning of October, the specifying how medical information should be shared between healthcare providers, insurance companies, and patients.
- Accenture released a over the next five years because of cybercrime.
- Regardless of healthcare data breaches, .
Mobile
- An allows hackers to trick users into visiting spoofed web pages.
Research & Studies
- A survey of cybersecurity professionals shows that .
- than previously thought a new study indicates.
- A study found that . The same study illustrates that social engineering was one of the most used methods cybercriminals used to gain entry to an organization’s network.
- The in 2015.
- each year, which is 20% more than last year.