News

News

  • September 13, 2017 13 Sep'17

    Risk & Repeat: Equifax data breach response called into question

    In this week's Risk & Repeat podcast, SearchSecurity editors tackle the massive Equifax data breach and how the credit bureau's response to the security incident is creating more problems.

  • September 13, 2017 13 Sep'17

    Apple claims iPhone X Face ID has better security than Touch ID

    Apple announced the new iPhone X Face ID system, which replaces Touch ID in favor of facial recognition and may offer 20 times fewer false positives than fingerprint scanning.

  • September 08, 2017 08 Sep'17

    Equifax breach exposes 143 million consumers' personal data

    A massive Equifax breach, which was discovered in July, exposed the personal information, including names, birth dates and Social Security numbers, of 143 million Americans.

  • September 08, 2017 08 Sep'17

    Six new vulnerabilities in Android bootloaders uncovered

    News roundup: Researchers used the new BootStomp tool to uncover six vulnerabilities in Android bootloaders. Plus, a new wave of AWS S3 bucket data leaks strikes and more.

  • September 08, 2017 08 Sep'17

    Apache Struts vulnerability affects versions since 2008

    A researcher discovered a remotely exploitable Apache Struts vulnerability being actively exploited in the wild. A patch was released, and users were urged to update software immediately.

  • Sponsored News

    • Why Windows 10? Why Now? A Guide to Migrating Without Hassle

      Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More

    • Top 4 Ways to Strengthen Security with PC Lifecycle Management

      Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More

    • A Simple Guide to Increasing Productivity and Job Satisfaction Across Your Entire Organisation

      Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More

    • Top 6 Ways to Lower TCO Through PC Lifecycle Management

      If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More

    View All Sponsored News
  • September 07, 2017 07 Sep'17

    Dragonfly 2.0 hacker group seen targeting U.S. power grid

    Security researchers claim to be tracking a threat group called Dragonfly 2.0 hacker group that has been attacking critical infrastructure and setting up persistent infections on ICS networks.

  • September 07, 2017 07 Sep'17

    SHA-1 hashes recovered for 320M breached passwords

    Security researchers once again proved how easy it can be to recover SHA-1 hashes by cracking the hashes on nearly 320 million passwords related to data breaches.

  • September 06, 2017 06 Sep'17

    Risk & Repeat: Payment card security a growing concern

    In this week's Risk & Repeat podcast, SearchSecurity editors discuss new research from Verizon on payment card security and the effectiveness of PCI DSS compliance for enterprises.

  • September 01, 2017 01 Sep'17

    Intel kill switch ME code indicates connection to NSA

    Researchers discovered an Intel kill switch hiding in one of the chipmaker's software products, along with references to an NSA program focused on secure computing.

  • September 01, 2017 01 Sep'17

    Enterprise compliance with PCI DSS is up, says Verizon

    News roundup: More than half of enterprises are in compliance with PCI DSS, according to a Verizon report. Plus, Turla is on the attack again with a new campaign, and more.

  • September 01, 2017 01 Sep'17

    Risk & Repeat: Alternative infosec conferences on the rise

    In this week's Risk & Repeat podcast, SearchSecurity editors discuss how smaller, more targeted infosec conferences are making a name for themselves in the shadow of much larger events.

  • August 31, 2017 31 Aug'17

    Spambot email leak compromises 711M records

    An email leak containing 711 million records was found in a breach of a spambot list stored in the Netherlands and included both addresses and passwords used to access email accounts.

  • August 29, 2017 29 Aug'17

    Kaspersky-Russian ties still unclear, despite FBI push

    The specter of Kaspersky-Russian ties has reportedly led to an FBI campaign urging private organizations to drop Kaspersky Lab products; experts urge the FBI to share more evidence.

  • August 25, 2017 25 Aug'17

    Alleged Sakula malware attacker arrested by FBI

    The FBI arrested Chinese national Yu Pingan for alleged involvement with cyberattacks using the Sakula malware, the same malware reportedly used in the OPM breach.

  • August 25, 2017 25 Aug'17

    U.S. government cybersecurity is a mess, according to officials

    News roundup: John McCain, NIAC and others called out the administration for not doing enough on U.S. government cybersecurity. Plus, the Ropemaker exploit alters emails, and more.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close