New & Notable


Shared libraries could allow mobile data leakage

Researchers claim malicious actors could commit mobile data theft by using shared third-party libraries and abusing elevated privileges that the permissions granted.

Problem Solve

What was behind the VDP vulnerabilities?

Two VMware vulnerabilities in vSphere Data Protection were recently patched. Expert Judith Myerson explains how the flaws work and how to defend against them.


Microsoft gives antivirus makers more time with updates

Microsoft changes antivirus policy in Windows 10 Fall Creators Update in order to avoid further action in an antitrust case brought by Kaspersky.


Privacy Act doesn't apply to the FBI NGI

News roundup: The FBI Next Generation Identification biometrics database is exempt from the Privacy Act. Plus, Salesforce fired two top staffers after DEFCON, and more.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    CISSP practice quiz: Asset Security and data control

    Domain 2 of the CISSP exam, known as asset security, covers data security control, classification, ownership and more. Test your knowledge with this 10-question practice quiz.

  • Get Started

    CISSP Domain 2 prep: Data encryption methods, asset security

    This Security School will help prepare you for Domain 2 of the CISSP exam, providing overviews of data encryption methods, data ownership concepts and asset protection.

  • Get Started


    A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.

View All Get Started

Blog: Security Bytes

Sections from across SearchSecurity