Malware and Vulnerabilities - News, Features, and Slideshows
A growing tendency by business units and workgroups to sign up for cloud services without asking their IT organization creates serious risks for enterprises.
By Jaikumar Vijayan | 25 August, 2014 22:59
A week after Microsoft pulled a Patch Tuesday update that crippled some Windows 7 PCs, the company has yet to provide a working fix for either the original flaw or the resulting problem.
By Gregg Keizer | 22 August, 2014 21:31
Although Microsoft has pulled a patch from Windows Update that crippled some computers, it is still pushing a truncated version of the security update that contained the flawed fix.
By Gregg Keizer | 18 August, 2014 23:34
Microsoft is quietly recommending that customers uninstall one of last week's security updates after users reported that it crippled their computers with the infamous "Blue Screen of Death."
By Gregg Keizer | 18 August, 2014 03:45
A data breach at Supervalu Inc., one of the largest grocery wholesalers and retailers in the U.S., could affect thousands of people who shopped at the company's stores in June and July.
By Jaikumar Vijayan | 16 August, 2014 03:36
Microsoft has pulled out the big guns - a fear-of-God approach - to scare users into dumping Windows XP, telling them the most popular tasks done on a PC will put them in the crosshairs of cyber criminals.
By Gregg Keizer | 26 March, 2014 16:06
Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane.
By Jaikumar Vijayan | 14 March, 2014 10:27
As bitcoin values jumped in the last months of 2013, malware designed to steal the virtual currency exploded, security researchers from Dell SecureWorks said this week.
By Gregg Keizer | 28 February, 2014 20:36
Target's acknowledgement Friday that personal data of 70 million people, not 40 million as previously thought, may have been exposed to hackers in a recent data breach raises new questions about the incident and how it could affect victims.
By Jaikumar Vijayan | 10 January, 2014 17:13
BIG-IQ Security makes it easy to manage the entire firewall policy life cycle. Read about the key benefits and download the policy auditing and security compliance report today
Having an identity and access management solution is a must. Businesses cannot operate without them. However, this paper asks - are you sure the user credentials are being used by the correct individual? · Most organizations work hard to ensure compliance with corporate security policy but that doesn’t necessarily mean they’re protected · Managing identities is essential—but it can also lead to a false sense of security · Do the credentials and the behaviour make business sense? If you can’t interpret activity in the context of identity, you may be at risk
- IEEE standards group wants to bring order to IoT
- InfiniDB going out of business, but its database will live on as open source
- FCC questions how to enforce net neutrality rules
- iPhone 6 review roundup -- the raves come quietly
- Alibaba shares open at a high $92.70
- New organization sets out to make secure communication tools more user-friendly
- Tim Cook launches iPhone 6 sales in Palo Alto
- HP leapfrogs Red Hat to become top contributor to OpenStack
- New iPhone 6 and 6 Plus are easier to repair
- Shut out on iPhone 6 Plus, buyers settle for smaller version
- Screen size matters to Apple fans in line for the iPhone 6
- Half-baked mergers
- Ping Identity picks up $35 million more in venture funding
- Apple's iOS 8 fixes enterprise Wi-Fi authentication hijacking issue
- Watch video of the first iPhone 6...being dropped