• June 09, 2016 09 Jun'16

    TeamViewer hacks have everyone placing blame

    A rash of TeamViewer hacks has led to confusion concerning what the issues are and who is responsible for user security in this case.

  • June 09, 2016 09 Jun'16

    Petraeus slams encryption backdoors, supports Apple

    Speaking at the Cloud Identity Summit, Gen. David H. Petraeus blasted the FBI's recent efforts to compel Apple to break the company's own encryption protection.

  • June 08, 2016 08 Jun'16

    SWIFT banking system boosts security following cyberattacks

    Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers.

  • June 07, 2016 07 Jun'16

    Angler exploit kit skips Microsoft EMET to subvert Flash, Silverlight

    FireEye researchers spotted the Angler exploit kit bypassing the current Microsoft EMET version 5.5 security tool running on Windows 7 to subvert Flash and Silverlight.

  • June 03, 2016 03 Jun'16

    SandJacking attack enables installation of rogue apps on iOS devices

    Roundup: The new SandJacking attack technique allows attackers with physical access to iOS devices to install rogue apps. Plus, more on medical software security and Privacy Shield obstacles.

  • Sponsored News

    • The Key to Better DevOps Is in Your Data

      DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More

    • How to: Protecting Your Data in the Cloud

      Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    View All Sponsored News
  • June 02, 2016 02 Jun'16

    Crypto-confusion: The search for the real bitcoin creator continues

    In this Risk & Repeat podcast, SearchSecurity editors discuss Craig Wright's failed effort to prove he is bitcoin creator Satoshi Nakamoto and what that means for cryptocurrency.

  • June 02, 2016 02 Jun'16

    Lack of bug bounty programs won't deter cyber extortion attacks

    IBM reports 30 'bug poaching' cyber extortion attacks in the past year, as black hat hackers aim to "help" enterprises by exploiting SQL injection vulnerabilities.

  • June 01, 2016 01 Jun'16

    Microsoft warns of rare ransomware worm

    Microsoft warned users of a rare ransomware worm affecting older versions of Windows, but experts are wary of the recommended mitigation technique.

  • May 27, 2016 27 May'16

    House Reps tackle Rule 41 to limit government hacking

    US Reps. Poe and Conyers join Sen. Wyden's fight against changes to Rule 41 that would remove limits on government hacking, introduce companion bill to quash changes.

  • May 27, 2016 27 May'16

    'Ingenious' attack mixes memory deduplication with Rowhammer

    Researchers demonstrated an exploit that combines rare attacks on memory deduplication and Rowhammer in order to allow an adversary access to read or write system memory.

  • May 27, 2016 27 May'16

    RSA: Cloud visibility, analytics crucial to enterprises

    RSA's Rashmi Knowles spoke with SearchCloudSecurity about enterprises struggling with security visibility, and how analytics and data science can help.

  • May 26, 2016 26 May'16

    Retiring obsolete SHA-1 and RC4 cryptographic algorithms, SSLv3 protocol

    Microsoft speeds deprecation of SHA-1, Google dropping support for RC4, SSLv3, as web software publishers approach end of life for obsolete cryptographic algorithms and protocols.

  • May 26, 2016 26 May'16

    New spec aims to improve DNS privacy with TLS

    In order to stop metadata snooping by law enforcement and hackers, a proposed spec aims to improve DNS privacy with TLS.

  • May 24, 2016 24 May'16

    Lieu, Hurd school House colleagues on cyberhygiene, defense

    Former computer science majors Lieu and Hurd wrote to their U.S. House of Representatives colleagues, urging improved awareness of cyber risks and cyberhygiene.

  • May 24, 2016 24 May'16

    Paul Vixie on IPv6 NAT, IPv6 security and Internet of Things

    Internet pioneer Paul Vixie spoke with SearchSecurity about IPv6 NAT, IPv6 and the Internet of Things, and the long, thankless path to deploying IPv6.