SearchSecurity

New & Notable

News

Chrome users targeted through hijacked extensions

News roundup: Hackers leveraged eight hijacked Chrome extensions to attack 4.8 million browser users. Plus, Cloudflare stopped protecting a neo-Nazi website from DDoS attacks, and more.

News

Military may reuse enemy cyberweapons

The U.S. Defense Intelligence Agency wants to isolate, study, customize and reengineer malware from adversaries to be used as its own offensive cyberweapons.

News

Maersk admits to $300 million in ransomware costs

Danish shipping giant A.P. Moller-Maersk said the NotPetya ransomware attacks severely damaged business processes and the impact has been estimated at as much as $300 million in lost revenue.

News

IOS 11 could avoid legal forced access by law enforcement

IOS 11 will allow users to avoid authorities attempting to force smartphone access by temporarily disabling biometric unlocking of mobile devices.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    CISSP practice quiz: Asset Security and data control

    Domain 2 of the CISSP exam, known as asset security, covers data security control, classification, ownership and more. Test your knowledge with this 10-question practice quiz.

  • Get Started

    CISSP Domain 2 prep: Data encryption methods, asset security

    This Security School will help prepare you for Domain 2 of the CISSP exam, providing overviews of data encryption methods, data ownership concepts and asset protection.

  • Get Started

    CAPTCHA

    A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.

View All Get Started

Blog: Security Bytes

Sections from across SearchSecurity

  • News

    View All
  • Government information security management

    Military may reuse enemy cyberweapons

    The U.S. Defense Intelligence Agency wants to isolate, study, customize and reengineer malware from adversaries to be used as its own offensive cyberweapons.

  • Web browser security

    Chrome users targeted through hijacked extensions

    News roundup: Hackers leveraged eight hijacked Chrome extensions to attack 4.8 million browser users. Plus, Cloudflare stopped protecting a neo-Nazi website from DDoS attacks, and more.

  • Data security breaches

    Maersk admits to $300 million in ransomware costs

    Danish shipping giant A.P. Moller-Maersk said the NotPetya ransomware attacks severely damaged business processes and the impact has been estimated at as much as $300 million in lost revenue.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close