News

News

  • October 15, 2015 15 Oct'15

    Cybersecurity strategy needs to be more dynamic, experts say

    The digital world moves very fast, but a new survey claims that cybersecurity strategy does not move fast enough to keep up with threats -- and experts tend to agree.

  • October 14, 2015 14 Oct'15

    Windows 10 security fixes longtime OS vulnerabilities

    Windows 10 security incorporates years of improvements to remove or mitigate long-term issues with Windows vulnerabilities.

  • October 13, 2015 13 Oct'15

    October Patch Tuesday: The first of 2015 with no zero-day exploits

    Microsoft's October 2015 Patch Tuesday has the fewest number of bulletins of any release this year, and is also the first of the year to not feature any patches related to zero-day exploits.

  • October 13, 2015 13 Oct'15

    Chinese hackers arrested at the request of the US

    China's government has reportedly arrested a number of Chinese hackers suspected of involvement with attacks on the US, but one expert is unsure this will lead to more cooperation between nations.

  • October 09, 2015 09 Oct'15

    Safe Harbor agreement invalid: Privacy win or enterprise woe?

    News roundup: The EU Court has invalidated the Safe Harbor agreement, leaving companies scrambling to deal with overseas data transfers securely. Plus: SHA-1 collision attack; NIST email security initiatives; worry over cyberthreats.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Choosing the Right Tools to Harness Big Data

      As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • Optimize Your Journey to Azure AD

      For IT managers under pressure to improve security while streamlining costs and resources, the decision to adopt cloud-based applications such as Office 365 is easy. Unfortunately, the transition from on-premises Active Directory to cloud-based Microsoft Azure Active Directory (Azure AD) or a hybrid solution may not be as easy as it would seem. Even those already operating in the cloud could benefit by optimizing their environments. See More

    View All Sponsored News
  • October 09, 2015 09 Oct'15

    Vigilante Team White hackers admit to infecting 300,000 devices

    Team White hackers have taken credit for infecting more than 300,000 devices with the Wifatch malware designed to harden security, but experts still question the team's vigilante actions.

  • October 08, 2015 08 Oct'15

    Cybercrime costs rising, experts say application layer needs budget

    Two separate reports noted that cybercrime costs are significant. Some experts said reallocating budget resources to application layer security may be the answer.

  • October 06, 2015 06 Oct'15

    New YiSpecter iOS malware affects non-jailbroken devices

    Malicious actors have found new ways to attack non-jailbroken iOS devices, but experts say the YiSpecter iOS malware may not be as dangerous as it sounds.

  • October 02, 2015 02 Oct'15

    Router malware may be white hat security vigilantism

    An unknown source is infecting thousands of routers with malware not to intentionally cause harm, but apparently as an act of white hat security vigilantism to make the routers safer.

  • October 02, 2015 02 Oct'15

    As EMV adoption lags, industry remains optimistic

    News roundup: Despite a low adoption rate going into the liability shift, many in the industry are optimistic about the future of EMV use. Plus: TrueCrypt flaws; AWS crypto keys stolen; women in infosec.

  • October 01, 2015 01 Oct'15

    Android Stagefright 2.0 affects all 1.4 billion Android devices

    The Android Stagefright vulnerability has been updated to version 2.0, as the original researcher found the flaw in all versions of Android released to date. Google has promised a fix within days.

  • October 01, 2015 01 Oct'15

    Study claims enterprise vulnerability remediation can take 120 days

    A new study has found that although flaws are most likely to be exploited within 60 days of discovery, companies can take between 100 and 120 days for vulnerability remediation.

  • October 01, 2015 01 Oct'15

    The EMV liability shift date is here, now what?

    The Oct. 1, 2015 deadline for EMV liability has arrived, though merchants and retailers alike aren't ready for the change.

  • September 25, 2015 25 Sep'15

    Google Project Zero reports more Kaspersky software vulnerabilities

    Kaspersky Lab has fixed some of the vulnerabilities in its antivirus products, but a new report from Google Project Zero reveals there's more work to be done.

  • September 25, 2015 25 Sep'15

    OPM breach widens to 5.6 million fingerprint records

    News roundup: More fingerprint records were stolen during the OPM breach than originally reported. Plus: the $1 million iOS bounty; DHS CISO calls for harsher phishing policies; Safe Harbor in hot water.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close