News

News

  • March 29, 2016 29 Mar'16

    Report: 1.5 million Verizon Enterprise customer records stolen

    Krebs on Security reports 1.5 million customer contact records were swiped from Verizon Enterprise Solutions and offered for sale on Dark Web; customers are at risk for phishing attacks.

  • March 29, 2016 29 Mar'16

    DOJ finds successful iPhone crack; drops backdoor bid, for now

    The DOJ found a successful iPhone crack to access the San Bernardino, Calif., terrorist's device and dropped the pending legal action against Apple, but only in that one case.

  • March 25, 2016 25 Mar'16

    Congress considers 'going dark' encryption legislation

    Roundup: Sens. Dianne Feinstein and Richard Burr seek support for an encryption legislation draft, as U.S. politicians consider their options to address the 'going dark' problem.

  • March 25, 2016 25 Mar'16

    Outbreak of ransomware attacks hit hospitals, enterprises

    A series of ransomware attacks have been reported at hospitals in the U.S. and Canada, leading to experts recommending automated backup for enterprises.

  • March 24, 2016 24 Mar'16

    FBI iPhone backdoor case on hold, as potential hack surfaces

    The FBI iPhone backdoor case was put on hold temporarily, as reports surfaced of a possible hack that would allow FBI access without the help of Apple.

  • Sponsored News

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Avoid the Pain of Cloud Silos With Unified Management and Visibility

      Hybrid infrastructure is the result of a fundamental evolution of IT to the cloud, and it has become the norm for most midsize and larger organizations. As the prevalence of hybrid environments increases, one of the most confounding and troublesome problems to emerge is a lack of comprehensive management and visibility across the entire IT infrastructure—whether in the cloud or on premises. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    View All Sponsored News
  • March 21, 2016 21 Mar'16

    Stagefright exploit created with reliable ASLR bypass

    Researchers have developed a Stagefright exploit, which could mean hundreds of millions of Android devices are at risk, despite mitigations and an available patch.

  • March 18, 2016 18 Mar'16

    Apple court filing challenges iPhone backdoor as rhetoric heats up

    The rhetoric about the iPhone backdoor from Apple and the FBI has gotten more intense as Apple challenged the FBI in court by calling its motion unconstitutional.

  • March 18, 2016 18 Mar'16

    Google boosts HTTPS, Certificate Transparency to encrypt Web

    Roundup: Google pushes efforts on HTTPS, Certificate Transparency and more to safeguard the Web with encryption, while other tech firms are eyeing more, stronger encryption.

  • March 18, 2016 18 Mar'16

    Automated penetration testing prototype uses machine learning

    A team created a prototype machine learning vulnerability scanner that can think like a human in order to perform automated penetration testing.

  • March 16, 2016 16 Mar'16

    Phishing campaign takes ransomware attacks to a global scale

    Research has uncovered ransomware attacks that begin with a sophisticated phishing campaign hitting users around the globe.

  • March 16, 2016 16 Mar'16

    Java vulnerability report strains responsible disclosure

    A security researcher reports Oracle's 30-month-old failed patch for a Java vulnerability, and experts suggest it was an irresponsible disclosure, despite frustration with Oracle's patching process.

  • March 11, 2016 11 Mar'16

    DROWN attack: TLS under fire again

    News roundup: DROWN attack affects millions of servers with an SSLv2 vulnerability; the Home Depot breach lawsuit settlement is pending; and Chinese smartphone-maker ZTE is sanctioned.

  • March 09, 2016 09 Mar'16

    Crowdsourced vulnerability patching could save us all

    Patching systems can be time-consuming and troublesome, so one expert suggests crowdsourced vulnerability patching to make the process faster and easier.

  • March 08, 2016 08 Mar'16

    March 2016 Patch Tuesday highlights Windows 10 security

    Microsoft's March 2016 Patch Tuesday release has put Windows 10 security on display for good and bad, experts say.

  • March 04, 2016 04 Mar'16

    AI may soon find and patch a software bug automatically

    The cybersecurity industry is getting closer to artificial intelligence that can find and patch software bugs automatically, but that same tech could lead to autonomous hacking.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close