security - News, Features, and Slideshows
- How to fix the two-factor authentication log-in error in Gmail on Android
- How to fight back against CryptoLocker
- Build your own camera, launch it like a grenade
- Google extends two-factor authentication with physical USB keys
security in pictures
Adobe Systems said Thursday it is now encrypting data it collects about certain e-books after facing criticism earlier this month for not protecting the data.
By Jeremy Kirk | 24 October, 2014 13:27
Facebook and Yahoo have developed a mechanism to prevent the owners of recycled email addresses from hijacking accounts that were registered on other sites using those addresses in the past.
By Lucian Constantin | 24 October, 2014 06:04
The size and volume of distributed denial-of-service attacks has exploded in the past year, with a 389 percent increase in average attack bandwidth between the third quarter of 2013 and the third quarter of 2014, according to an Internet security report from Akamai Technologies.
By Grant Gross | 24 October, 2014 03:59
Many companies set up subdomains for use with external services, but then forget to disable them when they stop using those services, creating a loophole for attackers to exploit.
By Lucian Constantin | 24 October, 2014 00:57
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry for a new one from your wireless carrier; you and a friend are swapping devices; you loaded too many applications or media and just want to start over from scratch; etc.
By Al Sacco | 15 December, 2010 07:11
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.
By Tony Bradley | 15 December, 2010 07:13
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
It's looking more and more likely that Microsoft Security Essentials (MSE) is warning about a Trojan:DOS/Alureon.J infection when none exists.
By Woody Leonhard | 08 October, 2014 22:30
The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the US payment system to smartcard technology can't happen fast enough.
By Jaikumar Vijayan | 16 August, 2014 20:49
What businesses know about any given individual is a lot. But what are companies doing with that data? Not as much as you might think -- at least not yet. Companies are getting more sophisticated, however.
By Robert L. Mitchell | 06 August, 2014 01:33
Getting employees to take security seriously can be a game that everyone wins.
By Lamont Wood | 17 July, 2014 14:05
Whitepapers about security
Cyber Attacks are painful and destructive. It’s essential to defend your business with a powerful protection system. In this whitepaper, you’ll learn how to get cyber resilient and safeguard your data: • Find out which questions you should ask to find a security solution that works with your business • Understand why your business is a bigger target than you thought • Learn how to protect your brand and bottom line by quickly detecting and responding to attacks
Benefits based on Forrester Consulting Study “The Total Economic Impact of Converging SAP Landscapes on Vblock™ Systems”
Smart companies use DevOps to speed the rollout and quality of new apps and services to market. Read this report to see the findings from a survey of 1300 global IT leaders, including the real benefits a good DevOps strategy can bring to your business.
- Usage alert compliance a priority as TCP code enforcement heads into year three
- Symantec donates $260k towards cyberbullying prevention
- Court delays NBN Co, Pipe Networks battle
- Adobe begins encrypting user data collected from Digital Editions app
- Apple: A pox on your house!
- In brief: Beanhunter acquires CoffeeJobs.com for undisclosed sum
- Amazon builds sales, but losses pile up
- In Pictures: Camels, Sleds, and Fishing Boats - 7 Wacky Google Street View Vehicles
- Apple Pay's next move could be phone-to-phone payments
- Oracle says state wanted to take 'unacceptable risk' with health care website transition
- Microsoft Q1 sales jump, but Nokia drags down earnings
- Canonical celebrates Cloud freedoms with new Ubuntu
- Apple and sapphire supplier strike deal to end partnership
- Collection of new cord cutting techs make it easier to snip that CATV tether
- Microsoft exec opens up about Research lab closure, layoffs