security - News, Features, and Slideshows
- How to fix the two-factor authentication log-in error in Gmail on Android
- How to fight back against CryptoLocker
- Ex-NSA director Alexander calls for new cybersecurity model
- Wi-Fi sniffing lets researchers take social snapshots of crowds
security in pictures
The Xen Project has revealed the details of a serious vulnerability in the Xen hypervisor that could put the security of many virtualized servers at risk.
By Lucian Constantin | 02 October, 2014 04:21
Atlanta -- Sophisticated attacks like Stuxnet aren't necessary to compromise industrial control systems for dams, power plants, chemical plants and the like. Rather, simple phishing attacks followed up by using tools that are easily available through Metasploit will do the trick, security pros were told at a conference in Atlanta this week.
By Tim Greene | 02 October, 2014 04:18
Late night talk show host Jimmy Kimmel doesn't fit the profile of McAfee's usual Most Dangerous Cyber Celebrity, most often in recent years a female celebrity whose online images can frequently lure Web surfers to sites rife with spyware, viruses and other malware.
By Bob Brown | 02 October, 2014 03:26
The Joomla project pushed out new updates for its popular content management system Wednesday after a glitch was found in the high-priority security patches it released a day before.
By Lucian Constantin | 02 October, 2014 02:48
Virtual private network servers based on OpenVPN might be vulnerable to remote code execution attacks through Shellshock and other recent flaws that affect the Bash Unix shell.
By Lucian Constantin | 02 October, 2014 00:15
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry for a new one from your wireless carrier; you and a friend are swapping devices; you loaded too many applications or media and just want to start over from scratch; etc.
By Al Sacco | 15 December, 2010 07:11
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.
By Tony Bradley | 15 December, 2010 07:13
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the US payment system to smartcard technology can't happen fast enough.
By Jaikumar Vijayan | 16 August, 2014 20:49
What businesses know about any given individual is a lot. But what are companies doing with that data? Not as much as you might think -- at least not yet. Companies are getting more sophisticated, however.
By Robert L. Mitchell | 06 August, 2014 01:33
Getting employees to take security seriously can be a game that everyone wins.
By Lamont Wood | 17 July, 2014 14:05
Whitepapers about security
A growing number of organisations are using off the shelf technologies to stretch application processing and data access for continuous application and availability. This paper describes how deployment models for applications work. Enterprises are consolidating high availability and data recovery practices and technologies to achieve continuous availability that provides users with uninterrupted access to data and applications The right solution provides data coherency across distance for simultaneous access to the same data in multiple locations Organisations need to be able to trust that the data and applications it depends on will continues to be available and operate, through both planned and unplanned outages
These days IT teams must support a multiplicity of devices, operating systems and work habits. This paper helps readers learn how best to simplify administration and secure vital data. • To capitalize on mobility, enterprises need to provide employees with access to corporate data and applications anytime, anywhere • Organizations need to expand access to corporate networks without exposing the organization to threats • Organizations must have the flexibility to accommodate a wide range of variables today and lay the groundwork for future developments
- Conservative group says 2.4 million opposed to net neutrality rules
- Xen Project discloses serious vulnerability that impacts virtualized servers
- FCC takes steps to make room for 'white spaces,' wireless microphones
- Expert: Basic hacks can compromise industrial control systems
- Activists push Facebook to abandon its real-names policy
- ARM builds an OS for the Internet of Things
- 3D vendor sells $1,500 part to make metal guns
- IT pros should pay attention to 'shadow IT,' Interop NY keynoters urge
- Don't laugh: Jimmy Kimmel Most Dangerous Cyber Celebrity of 2014
- After a long road to the server market, ARM CEO Segars looks ahead
- FCC: Some TV stations could earn huge dollars in spectrum auction
- Hurry! Wait! Go! Joomla stumbles with patch for serious vulnerability
- Microsoft weaves around Office bloat complaints with Sway authoring tool
- Google bows to pressure, removes news snippets from German search results
- OpenVPN servers can be vulnerable to Shellshock Bash vulnerability