• April 21, 2016 21 Apr'16

    Oracle patches now more critically rated with CVSS 3.0

    Oracle patches 136 security flaws in various products and a number of vulnerabilities were rated more critical because of a switch to CVSS 3.0.

  • April 21, 2016 21 Apr'16

    JBoss vulnerability highlights dangers of unpatched systems

    Up to 3.2 million servers with unpatched JBoss vulnerability from 2010 are open to spread ransomware through networks; experts urge keeping up with software patches to stay safe.

  • April 21, 2016 21 Apr'16

    Google's second Android Security Report is a mixed bag

    The second annual Android Security Report details a number of ways Google has been working to improve security on its mobile platform but also highlights persistent problems.

  • April 19, 2016 19 Apr'16

    Apple won't patch zero days so uninstall QuickTime now

    DHS says users need to uninstall QuickTime for Windows immediately as Apple quietly sends the software to its end of life following the disclosure of two zero-day flaws.

  • April 15, 2016 15 Apr'16

    Microsoft fights to notify users of FBI surveillance

    Microsoft has sued the Department of Justice in an effort to be allowed to notify users of FBI surveillance requests; expert worried about continuous surveillance.

  • Sponsored News

    • The Key to Better DevOps Is in Your Data

      DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More

    • How to: Protecting Your Data in the Cloud

      Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Cloud-Based Disaster Recovery

      Our world has become increasingly complex. In the past, the most likely cause of system downtime was either equipment failure or a power outage. Today, there are new threats to your business operations, including data breaches, ransomware and other malicious activities. See More

    View All Sponsored News
  • April 15, 2016 15 Apr'16

    Burr-Feinstein draft bill fuels encryption debate

    The encryption debate continues with release of the official draft of Burr-Feinstein 'Compliance with Court Orders Act of 2016' mandating court order compliance.

  • April 14, 2016 14 Apr'16

    Badlock vulnerability proves a bust for responsible disclosure

    The much-hyped Badlock bug is still important to patch, but raised issues with celebrity vulnerability promotion and responsible disclosure of security vulnerabilities.

  • April 12, 2016 12 Apr'16

    April 2016 Patch Tuesday: Badlock isn't a priority

    Microsoft's April 2016 Patch Tuesday includes a patch for Badlock, a vulnerability which experts call "overhyped," but the most important patches may need extra care to apply.

  • April 12, 2016 12 Apr'16

    WordPress SSL now free for hosted sites, thanks to Let's Encrypt

    Customers with hosted sites will now have WordPress SSL turned on for free by default, thanks to Let's Encrypt certificates, potentially making a large number of websites more secure.

  • April 08, 2016 08 Apr'16

    Encrypted messaging for all, as WhatsApp encryption announced

    WhatsApp encryption was turned on for all types of messaging, including group chats, which advanced the conversation on 'going dark,' as new encryption legislation draft goes public.

  • April 08, 2016 08 Apr'16

    Vulnerability branding becomes another marketing tool

    Vulnerability branding was once a practice that elevated understanding of flaws and potentially led to better remediation, but now serves as little more than marketing for security researchers.

  • April 07, 2016 07 Apr'16

    OSVDB shutdown leaves questions for vulnerability databases

    OSVDB shutdown, blamed on lack of community support and engagement, raises questions about whether open source vulnerability databases can work and how they can be improved.

  • April 05, 2016 05 Apr'16

    Gmail BREACH attack gets much faster but still easy to stop

    Security researchers updated BREACH attack that would allow a Facebook Messenger or Gmail breach to be performed much faster, but the overall risk is limited.

  • April 01, 2016 01 Apr'16

    Apple-FBI suit dropped, but crypto wars continue

    Roundup: After the Apple-FBI suit, ACLU reports U.S. ramping up crypto wars with All Writs suits for at least 63 iOS, Android devices; Senator Wyden stands up for strong crypto.

  • April 01, 2016 01 Apr'16

    Can cybersecurity spending protect the U.S. government?

    CNAP articulates the right things, as many U.S. government cyber initiatives do, but what has captured the attention of the Beltway is the billion-dollar budget proposals.