security - News, Features, and Slideshows
- New Chrome extension spots unencrypted tracking
- How to fix the two-factor authentication log-in error in Gmail on Android
- How to fight back against CryptoLocker
- DNS hijacking vulnerability affects D-Link DSL router, possibly other devices
security in pictures
Verizon will soon allow customers to opt out of having an identifier placed on their phones that had alarmed privacy advocates due to its ability to let third parties persistently track customers.
By Zach Miners | 31 January, 2015 08:01
A peer-to-peer botnet called ZeroAccess came out of a six-month hibernation this month after having survived two takedown attempts by law enforcement and security researchers.
By Lucian Constantin | 31 January, 2015 03:29
Google has agreed to improve the information it provides to people about how it collects personal data in the U.K., after it was required to do so by country's data protection authority.
By Loek Essers | 31 January, 2015 00:19
A critical vulnerability in glibc, a core Linux library, can be exploited remotely through WordPress and likely other PHP applications to compromise Web servers.
By Lucian Constantin | 31 January, 2015 00:08
Many women gamers and developers, as well as those who support them, havelately come under attack from online trolls. A common intimidation tactic that trolls use is "doxxing," or publicly exposing their targets' personal details, including home address, phone number and even financial records.
By Ken Gagne | 21 November, 2014 05:55
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry for a new one from your wireless carrier; you and a friend are swapping devices; you loaded too many applications or media and just want to start over from scratch; etc.
By Al Sacco | 15 December, 2010 07:11
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.
By Tony Bradley | 15 December, 2010 07:13
Beyond the compromise of valuable information, loss of revenues and damage to brand reputation, data breaches can pose a threat to the careers of security professionals involved: witness the sudden departures of both the CEO and the CIO of Target after last year's compromise of 40 million customers' credit cards.
By Tim Greene | 29 January, 2015 02:48
2014 made it clear that cybercrime affects everyone. From retailers to banks, consumer goods companies and health care, there isn't an industry left untouched by cybercriminals looking to disrupt, steal or embarrass. So what has to change? The recent Sony attack and countless other examples point to the need for board members and executives to consider cybersecurity under the concept of risk management and business resilience.
By By Adam Meyer, Chief Security Strategist, SurfWatch Labs, a cyber risk intelligence company | 10 January, 2015 05:08
News of North Korea's Internet outage was widely covered in the media on Monday of this week, and while a number of questions remain about what happened and who was responsible, speculation has it that North Korea was hit by a DDoS attach."
By Ofer Gayer | 24 December, 2014 08:04
It has been an exceptional year for IT security breaches, which have become part of an escalating trend in destructive attacks. And they're going to get worse.
By Patrick Thibodeau | 19 December, 2014 04:29
A funny thing is happening in the wake of the Edward Snowden NSA revelations, the infamous iCloud hack of celebrity nude photos, and the hit parade of customer data breaches at Target, Home Depot and the U.S. Postal Service. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.
By Matt Weinberger | 15 November, 2014 02:37
Whitepapers about security
Future Group, a major player in India’s retail sector, was looking to be more competitive wish faster time to market and better security. This case study outlines: •How they achieved solid security in the complex management of a huge number of desktops •Which benefits they received, the hardware and storage used as well as the applications delivered •Gave back control to the company, reducing IT costs and maximising end-user experience for all
This whitepaper looks into one of Australia’s largest engineering, contracting and service organisations and why they have chosen to adopt VDI, their goals and achievements since implementation. •Provides advice to technology leaders considering their own workplace strategy and/or evaluating VDI •Major benefits found in cost management through the centralisation of infrastructure •Productivity and employee engagement increased through more efficient mobilisation of over 20 processes
- Microsoft to business: Don't worry about Windows 10, consumers will test it
- Google Now adds data from Lyft, Airbnb and many more apps
- Outlook app for Android and iOS boosts Microsoft's mobile comeback
- MIT randomizes tasks to speed massive multicore processors
- NEC aims at Big Data 'sweet spot' with new SAP Hana tool
- Uber will fight to keep its Boston ride data private
- Verizon to allow opt-out from mobile 'supercookies'
- Brief: Tesla boosts 0-60 acceleration with over-the-air software upgrade
- AT&T will pay $18.2B as top bidder in mobile spectrum auction
- BMW cars found vulnerable in Connected Drive hack
- Twitter's Vine Kids app is not just for kids
- Apple puts the big hurt on Samsung
- Google Glass holds promise but requires a 'reset'
- Microsoft updates cloud-based SQL Server to simplify management
- Intuit backpedals from TurboTax changes after upgrade uproar