Security News, Features, and Interviews

  • Replace SHA-1. It’s not that hard.

    Now that SHA-1 has been broken it’s time for enterprises that have ignored its potential weakness for years to finally act, and it’s not that hard.

    25 Feb. 17 05:03 Written by Tim Greene
  • Stop using SHA1: It’s now completely unsafe

    Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature.

    24 Feb. 17 09:35 Written by Lucian Constantin
  • Eleven-year-old root flaw found and patched in the Linux kernel

    Linux system administrators should watch for kernel updates for their distributions and apply them as soon as possible because they fix a local privilege escalation flaw that could lead to a full system compromise.

    24 Feb. 17 02:11 Written by Lucian Constantin
  • Amid cyberattacks, ISPs try to clean up the internet

    If your computer’s been hacked, Dale Drew might actually know about it. His company, Level 3 Communications, is a major internet backbone provider and routinely on the lookout for cyberattacks on the network level. From what they can tell, there’s a staggering 178 million IP addresses out there associated with malicious activity.

    24 Feb. 17 00:30 Written by Michael Kan
  • New macOS ransomware spotted in the wild

    A new file-encrypting ransomware program for macOS is being distributed through bittorrent websites and users who fall victim to it won't be able to recover their files, even if they pay.

    23 Feb. 17 05:58 Written by Lucian Constantin
  • Cisco touts next-gen firewall gear for midsize installations

    Cisco is coming out with four next generation firewall boxes aimed at giving smaller organizations protection that is better sized to their needs and engineered to minimize performance hits as additional security services are turned on.

    23 Feb. 17 04:54 Written by Tim Greene
  • 5 open source security tools too good to ignore

    Look to these clever open source tools to keep secrets out of source code, identify malicious files, block malicious processes, and keep endpoints safe

    21 Feb. 17 22:00 Written by Fahmida Y. Rashid
  • Hackers behind bank attack campaign use Russian as decoy

    The hackers behind a sophisticated attack campaign that has targeted financial organizations around the world have intentionally inserted Russian words and commands into their malware in an attempt to throw investigators off.

    21 Feb. 17 02:00 Written by Lucian Constantin
  • 12 "White Hat" hackers you should know

    These "White Hat" security researchers are ethical hackers whose discoveries and inventions shake things up — as they try to stay one step ahead of their underground "Black Hat" cousins…

    20 Feb. 17 13:15 Written by Ellen Messmer

Market Place