News

News

  • July 30, 2015 30 Jul'15

    Intel, Cisco pushing for enhanced security communication, integration

    Vendors, such as Intel and Cisco, are hoping to pave the way for a security ecosystem in which applications communicate threat intelligence amongst each other. Will it work?

  • July 30, 2015 30 Jul'15

    Xceedium turns deaf ear, triggers vulnerability disclosure

    Swiss research group modzero disclosed a vulnerability that enabled remote attacks on Xceedium's Xsuite privileged access manager.

  • July 29, 2015 29 Jul'15

    The same Chinese hackers linked to United, Anthem and OPM breaches

    Sources claim the same Chinese hackers are behind the attacks on United Airlines, Anthem Health Services and the U.S. Office of Personnel Management.

  • July 29, 2015 29 Jul'15

    Security operations centers could be key to better security

    Video: Security operations centers are critical to continuous network monitoring and detecting data breaches. Eric Cole discusses SOCs and the role security automation plays in them.

  • July 27, 2015 27 Jul'15

    Another government data breach: U.S. Census Bureau admits to hack

    The U.S. Census Bureau admits that it was attacked and had data exfiltrated from its systems. One expert says this latest government data breach is another example that federal systems are not safe from attack.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Choosing the Right Tools to Harness Big Data

      As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • Optimize Your Journey to Azure AD

      For IT managers under pressure to improve security while streamlining costs and resources, the decision to adopt cloud-based applications such as Office 365 is easy. Unfortunately, the transition from on-premises Active Directory to cloud-based Microsoft Azure Active Directory (Azure AD) or a hybrid solution may not be as easy as it would seem. Even those already operating in the cloud could benefit by optimizing their environments. See More

    View All Sponsored News
  • July 27, 2015 27 Jul'15

    Valve fixes Steam password bug that led to compromised accounts

    A glaring error in the Steam password recovery system allowed hackers to take over accounts for Valve's popular gaming platform.

  • July 24, 2015 24 Jul'15

    Alleged car hack prompts call for vehicle security act, DMCA exemption

    News roundup: A wireless car hack demonstration has pushed vehicle security legislation and DMCA exemptions into the spotlight, and prompted a manufacturer recall. Plus: Hacking Team update; DHS email issues; and smartwatches vulnerable to attack.

  • July 24, 2015 24 Jul'15

    HP scares IT teams with Windows Phone critical vulnerabilities

    HP's Zero Day Initiative has disclosed four critical vulnerabilities found in Internet Explorer that could lead to remote code execution, but mistakenly labeled them as affecting Windows desktop rather than Windows Phone.

  • July 23, 2015 23 Jul'15

    National Guard breach highlights the risk of accidental data exposure

    The National Guard reported an accidental data exposure affecting thousands of former and current employees was not related to the OPM breach.

  • July 22, 2015 22 Jul'15

    Hackers targeting .NET shows the growing pains of open source security

    According to researchers, malware makers have been targeting .NET since Microsoft made the software open source. And experts debate to what extent open source security can be maintained.

  • July 21, 2015 21 Jul'15

    Microsoft releases out-of-band patch for Windows zero-day

    A Windows zero-day affecting a wide swath of Microsoft products has been found in the Hacking Team data leak, so Microsoft has released an out-of-band patch to fix the vulnerability.

  • July 20, 2015 20 Jul'15

    Black Hat and Google speak out against Wassenaar Arrangement

    The Wassenaar Arrangement is a multilateral export control association aimed at controlling a wide range of goods, including intrusion software. However, Black Hat and Google believe the proposed rules will have a negative impact on security.

  • July 17, 2015 17 Jul'15

    DOJ takes down Darkode, but for how long?

    The U.S. Department of Justice, in coordination with 20 countries, has taken down the computer hacking forum known as Darkode, but experts say the community is already rebuilding.

  • July 17, 2015 17 Jul'15

    Subway app reverse engineering highlights uptick in mobile app safety

    News roundup: Are the tides turning on mobile app safety? One white hat hacker's attempt to reverse-engineer the Subway app offers surprising results. Plus: CloudFlare Transparency Report; another call to eliminate RC4; Black Hat attendant survey.

  • July 16, 2015 16 Jul'15

    Flash Player security failures turn up the hate

    There have been calls for the death of the Adobe Flash Player for years either due to performance issues or the threat of exploit. But with a recent rash of zero-day vulnerabilities, those calls are getting louder.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close