security - News, Features, and Slideshows
- How to fix the two-factor authentication log-in error in Gmail on Android
- iPhone gets first free app for encrypting voice calls
- How to fight back against CryptoLocker
- Zero-day flaws found in Symantec's Endpoint Protection
security in pictures
Microsoft has been ordered to comply with a U.S. government demand for a customer's emails stored on a company server in Dublin, Ireland.
By Jaikumar Vijayan | 01 August, 2014 20:00
The team at Mitro Labs, the developer of a password manager, is joining Twitter, and its software is being released under a free and open source license, Mitro said Thursday.
By John Ribeiro | 01 August, 2014 13:35
The latest release of a Microsoft security tool that's designed to stop exploits lets administrators control when third-party plugins are launched, a long favored route for attackers.
By Jeremy Kirk | 01 August, 2014 12:21
Some of those seeking to scrub their histories from the Web under Europe's "right to be forgotten" rule are being economical with the truth when making their requests, Google said Thursday.
By Zach Miners | 01 August, 2014 10:07
Most USB devices have a fundamental security weakness that can be exploited to infect computers with malware in a way that cannot easily be prevented or detected, security researchers found.
By Lucian Constantin | 01 August, 2014 06:43
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry for a new one from your wireless carrier; you and a friend are swapping devices; you loaded too many applications or media and just want to start over from scratch; etc.
By Al Sacco | 15 December, 2010 07:11
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.
By Tony Bradley | 15 December, 2010 07:13
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
Getting employees to take security seriously can be a game that everyone wins.
By Lamont Wood | 17 July, 2014 14:05
Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.
By Jaikumar Vijayan | 27 June, 2014 04:58
Google will provide enterprise-focused security and management features to its entire Android showcase of mobile devices, including features reserved only for Samsung devices running Samsung security software called Knox, a Google executive announced during the Google I/O keynote address Wednesday.
By Matt Hamblen | 26 June, 2014 06:59
Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling
By Paul Roberts | 02 June, 2014 20:10
Whitepapers about security
Security is an intrusive mechanism that is often seen to interfere with normal business operations. Nonetheless, security is essential to the normal operation of the business, and the right security mechanisms and approaches can minimize performance degradation.
It’s impossible to conduct a storage conversation these days without talking about “solid-state” or “flash storage.” Along with “virtualisation” and “cloud,” it’s one of those de-rigueur phrases. And, like those other two, flash is suffering from an over-exposure that can assume familiarity and understanding where it does not exist.
- Microsoft ordered to turn over customer data stored in the cloud
- 3 Australian firms targeted in APT campaign: report
- Telstra reveals private cloud offering
- Local tech sector outpacing US, UK: report
- ACCC mulls new pricing for SMS, voice calls
- Woolworths sees future in hybrid cloud
- Mitro makes password manager open source as team heads to Twitter
- Airport stopover, multi-platform publishing apps Aussie winners in Talent Unleashed Awards
- Microsoft security tool EMET 5.0 puts a leash on plugins
- Authors beware: computers can write fables
- Some are twisting the facts in requests to be forgotten, Google says
- Almost 200,000 people may have been affected by US visa system crash
- One of Google's mysterious barges is on the move
- Who wins if Iliad buys T-Mobile?
- Most USB thumb drives can be reprogrammed to silently infect computers