security - News, Features, and Slideshows
- Facebook tracks all site vistors, violating EU law, report says
- GitHub recovering from massive DDoS attacks
- The Upload: Your tech news briefing for Monday, March 30
- Stanford crypto expert Dan Boneh wins $175K computer science award
security in pictures
Over 100,000 devices have a misconfigured service called multicast DNS that accepts requests from the Internet and can potentially be abused to amplify distributed denial-of-service (DDoS) attacks.
By Lucian Constantin | 02 April, 2015 03:17
Palo Alto Networks is introducing a service that tips customers off when it discovers unique or particularly dangerous attacks against their networks, giving them a heads up that perhaps they are the targets of particularly resourceful, dedicated adversaries.
By Tim Greene | 02 April, 2015 02:51
U.S. President Barack Obama has signed an executive order authorizing the U.S. government to impose sanctions on people, organizations and governments that partake in "malicious cyber-enabled activities" that harm the country.
By Fred O'Connor | 02 April, 2015 02:42
Google has identified and disabled 192 Chrome browser extensions that injected rogue ads into Web pages opened by users without being upfront about it. The company will scan for similar policy violations in future.
By Lucian Constantin | 01 April, 2015 23:29
Verizon customers can now opt out of having a unique identifier placed on their phones that critics have labelled a 'supercookie' because it's almost impossible to remove.
By Zach Miners | 01 April, 2015 09:43
Bill Weinberg, Senior Director, Open Source Strategy, Black Duck Software
By By Bill Weinberg, Senior Director, Open Source Strategy, Black Duck Software | 05 March, 2015 07:21
Many women gamers and developers, as well as those who support them, havelately come under attack from online trolls. A common intimidation tactic that trolls use is "doxxing," or publicly exposing their targets' personal details, including home address, phone number and even financial records.
By Ken Gagne | 21 November, 2014 05:55
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry for a new one from your wireless carrier; you and a friend are swapping devices; you loaded too many applications or media and just want to start over from scratch; etc.
By Al Sacco | 15 December, 2010 07:11
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
By By Saryu Nayyar, CEO, Gurucul | 01 April, 2015 08:02
If there's a poster child for the challenges facing open source security, it may be Werner Koch, the German developer who wrote and for the last 18 years has toiled to maintain Gnu Privacy Guard (GnuPG), a pillar of the open source software ecosystem.
By Paul Roberts | 26 March, 2015 21:09
Ask security experts what to do when hit with ransomware -- the sophisticated malware that infects a device or network, uses military-grade encryption to restrict access, and demands payment for the decryption key -- and you'll typically get the same answer: "never pay the ransom."
By Colin Neagle | 17 March, 2015 00:59
There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen.
By David Strom | 11 March, 2015 07:24
A wealth of young security companies is trying to capitalize on businesses moving toward security platforms that help them respond more quickly when they suffer successful cyber attacks in hopes of limiting the damage they do.
By Tim Greene | 11 March, 2015 07:19
Whitepapers about security
Just as we’ve learned to tune out car alarms, so have we become impervious to the headlines of cybercrime. That’s despite cybercriminals stealing over 500 million identities1 in 2014, alone. According to a December 2014 Computer Weekly article2, “The production of malware continues on an industrial scale, with exploit kits and malware services putting sophisticated attack methods in the hands of relatively unskilled cyber criminals.” And unfortunately, ignoring the issue will not make it go away.
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
- CCMobile Designer / Developer - IOSNSW
- CCMobile Designer / Developer - IOSNSW
- CCDBA (Oracle/SQL)NSW
- FTDigital Account Manager - SEO, SEM, MediaNSW
- FTJunior Media Buyer - Sales CoordinatorNSW
- CCMobile iOS DeveloperNSW
- CCInformation ArchitectNSW
- CCInformation ArchitectNSW
- FTBusiness Management - Account Director - Leading Entertainment ClientNSW
- FTSenior SQL DBANSW
- FT.Net Solution ArchitectNSW
- CCSenior Systems EngineerNSW
- CC.Net Solution ArchitectNSW
- FTApplication Support SpecialistNSW
- CCSenior Release EngineerNSW
Future Group, a major player in India’s retail sector, was looking to be more competitive wish faster time to market and better security. This case study outlines: •How they achieved solid security in the complex management of a huge number of desktops •Which benefits they received, the hardware and storage used as well as the applications delivered •Gave back control to the company, reducing IT costs and maximising end-user experience for all
- N.C. primed for mega tech backlash over Indiana-like bill
- Where SDN falls down
- Health care industry receives first mobile apps from Apple, IBM
- Raspberry Pi 2 laptop coming with Pi-Top assembly kit
- Facebook 'riffs' on Snapchat with new group video app
- Cisco to buy SDN startup Embrane
- Start-up touts wireless charging from Wi-Fi and Bluetooth signals
- Google amps up assault on adware
- ARM fades from Windows PCs and tablets, but grows in Chromebooks
- Chef serves up devops for the enterprise
- Over 100,000 devices can be used to amplify DDoS attacks via multicast DNS
- Oracle bolsters Marketing Cloud to show CMOs the big picture
- Palo Alto service to flag particularly evil security attacks
- Obama authorizes sanctions against hackers
- AWS targets interrupted sessions with virtual desktops upgrade