Security

Google, Amazon push Flash closer to extinction

Internet users will get some respite from Flash-based attacks since Google and Amazon are stopping Flash ads from displaying

By Fahmida Y. Rashid | 28 August, 2015 20:27

Tags: Google

Who can stop malware? It starts with advertisers

Malware masquerading as advertising is a growing problem, and the ad industry must figure out how to weed out scammers from legitimate companies

Vidder's Software Defined Perimeter puts tight security around high value assets

Reducing the surface that needs to be protected to a single application, it's easier to apply very tight controls through Software Defined Perimeter techniques.

Agora Dark Web market discovers suspicious activity on servers, pauses operations

The Agora Dark Web market cited Tor Hidden Services security vulnerabilities that could allow de-anonymization attacks and temporarily shut down operations after discovering suspicious activity on its servers.

4 security metrics that matter

Today, management demands metrics to get a clearer view of security. Here are four metrics that deliver actionable insight -- and a few others with less value

Ashley Madison -- Can it possibly get any worse? (tl;dr: YES)

The Ashley Madison hack continues to make headlines. Naturally, that's because the news keeps getting worse. Worse for website owners Avid Media Group. And worse for the REAL victims, more importantly -- the people named in the hacked data dump...

By Richi Jennings | 25 August, 2015 13:51

Tags: security, cloud security

9 steps to make you completely anonymous online

The default state of Internet privacy is a travesty. But if you're willing to work hard, you can experience the next best thing to absolute Internet anonymity

MIT researchers create file system guaranteed not to lose data even if a PC crashes

MIT researchers created the first file system that is 'mathematically guaranteed' not to lose data even when a computer crashes.

Jump paywalls, score academic research for free, share it without being busted

At the Chaos Computer Club's Chaos Communication Camp, one brave soul explained how to jump paywalls, obtain academic research and freely share that research without being arrested.

Hackers call Time on Ashley Madison -- with huge data dump

Ashley Madison hackers released the site's user data, as threatened. Or, at least, that's what they say they've done. But it's likely that much of the data is forged or bogus in some way...

By Richi Jennings | 19 August, 2015 13:14

Tags: security, cloud security

Akamai: The Internet's aging protocols make juicy targets

The latest wave of Internet attacks doesn't just involve regular exploits like cross-site scripting, but also leverage aging protocols with enough volume to jam up Internet backbone routers

10 years on: 5 big changes to computer security

In the 10 years since Security Adviser debuted, the threats have changed -- as have the defenses, and no one can argue computer security is safer overall

Hack to steal cars with keyless ignition: Volkswagen spent 2 years hiding flaw

126 types of cars have been hackable for years and can be stolen thanks to a keyless security flaw; Volkswagen spent two years suing the researchers and trying to keep the vulnerabilities a secret.

At what point do white hat hackers cross the ethical line?

In recent months the news of Chris Roberts alleged hacking of an inflight entertainment system and possibly other parts of the Boeing 737 have sparked a wave of controversy. Public opinion was originally on Roberts' side, but the recent publication of the FBI affidavit changed that drastically. According to the affidavit, Roberts admitted to doing a live "pen-test" of a plane network in mid-air.

By By Ondrej Krehel and Darin Andersen of Cyberunited Lifars | 15 August, 2015 07:10

Tags: business issues, boeing, security, cloud security, fbi

Hacking Team gives us incontrovertible proof of targeted mobile threats

<em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

By By Kevin Mahaffey, CTO, Lookout | 15 August, 2015 05:43

Tags: Apple, skype, security, mobile security, Network World, Hacking Team

The six pillars of Next Generation Endpoint Protection

<em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

By By Tomer Weingarten, CEO, SentinelOne | 15 August, 2015 04:57

Tags: security, ICS, Network World, kaspersky lab

FAQ: What you need to know about chip-embedded credit cards

Banks have been sending millions of Americans credit and debit cards equipped with computer chips to improve the security of in-store purchases.

By Matt Hamblen | 13 August, 2015 00:24

Tags: Financial IT, no company, finance, industry verticals

With H-1B visa, diversity doesn't apply

Apple says workforce diversity "inspires creativity and innovation," but one of Apple's major contractors, Infosys, is far from diverse.

By Patrick Thibodeau, Sharon Machlis | 10 August, 2015 20:06

Tags: Apple, services, outsourcing, infosys, H-1B, IT outsourcing

Web Real Time Communication (WebRTC) applications emerge as the tech stabilizes

Perhaps the single-most significant standards based technological advancement in the field of unified communications over the past year has been the completion of Web Real Time Communication (WebRTC) standard and the appearance of several WebRTC based implementations.

By By Michael Frendo, EVP of Worldwide Engineering, Polycom | 07 August, 2015 06:54

Tags: unified communications, telecommunication, W3C, voip, Networking, 3C, IETF, World Wide Web Consortium

Network analysis is like turning over rocks

I just found out my company's employees have been finding ways to get around my Web filtering. And that came as a surprise, because I use a best-in-class product that employs a database to categorize and block website URLs, which I thought I could rely on. But as I found out, that product is not perfect.

By By J.F. Rice | 20 June, 2015 05:06

Tags: network security, Network Analysis, Google, security

Top Whitepapers

Featured Whitepapers