security - News, Features, and Slideshows
- How to fix the two-factor authentication log-in error in Gmail on Android
- Law enforcement agencies disrupt Gameover Zeus botnet
- How to fight back against CryptoLocker
- This Linux grinch could put a hole in your security stocking
security in pictures
A federal judge on Friday questioned the strength of a key lawsuit challenging the constitutionality of the government's Internet surveillance program known as "upstream" data collection.
By Zach Miners | 20 December, 2014 10:46
The FBI today named the North Korean government as responsible for the cyber attack against Sony Pictures last month, saying its technical analysis points to the isolated, Communist country.
By Gregg Keizer | 20 December, 2014 07:27
President Obama believes Sony made a mistake in canceling release of "The Interview" following a major cyberattack and said the U.S. is prepared to respond to the attack, but he wouldn't say when or how.
By Martyn Williams | 20 December, 2014 07:03
A new computer Trojan based on the infamous ZeuS banking malware is targeting users of over 150 banks and payment systems from around the world, security researchers warn.
By Lucian Constantin | 20 December, 2014 05:13
North Korea was responsible for the devastating cyberattack on Sony Pictures, the U.S. Federal Bureau of Investigation said Friday after a two-week investigation.
By Martyn Williams | 20 December, 2014 04:01
Many women gamers and developers, as well as those who support them, havelately come under attack from online trolls. A common intimidation tactic that trolls use is "doxxing," or publicly exposing their targets' personal details, including home address, phone number and even financial records.
By Ken Gagne | 21 November, 2014 05:55
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry for a new one from your wireless carrier; you and a friend are swapping devices; you loaded too many applications or media and just want to start over from scratch; etc.
By Al Sacco | 15 December, 2010 07:11
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.
By Tony Bradley | 15 December, 2010 07:13
It has been an exceptional year for IT security breaches, which have become part of an escalating trend in destructive attacks. And they're going to get worse.
By Patrick Thibodeau | 19 December, 2014 04:29
A funny thing is happening in the wake of the Edward Snowden NSA revelations, the infamous iCloud hack of celebrity nude photos, and the hit parade of customer data breaches at Target, Home Depot and the U.S. Postal Service. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.
By Matt Weinberger | 15 November, 2014 02:37
It's looking more and more likely that Microsoft Security Essentials (MSE) is warning about a Trojan:DOS/Alureon.J infection when none exists.
By Woody Leonhard | 08 October, 2014 22:30
The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the US payment system to smartcard technology can't happen fast enough.
By Jaikumar Vijayan | 16 August, 2014 20:49
Whitepapers about security
Today’s employees carry smartphones, tablets and laptops and rarely think twice about using their personal devices for work or work devices for personal activities. The mobile workforce will surpass 1.3 billion people, or 37% of the world’s overall workforce, by 2015 according to IDC.1
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
A new acronym has been defined for the solutions that address this space: Application Aware Network Performance Management (AANPM). Gartner Group has now begun tracking this as a new sector, which they have termed Network Performance Monitoring and Diagnostics, and are developing a Magic Quadrant on the solutions available. This White Paper examines the need for AANPM and how it helps organisations to optimise the performance of business critical applications while speeding up network and application trouble-shooting and minimising downtime.
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright
- FBI concludes North Korea 'responsible' for Sony hack
- What we know about North Korea's cyberarmy
- Cyberattack on German steel factory causes 'massive damage'