• January 30, 2015 30 Jan'15

    Will YouTube HTML5 transition mean the end of Flash security issues?

    News roundup: YouTube announced it has stopped using Flash by default in favor of HTML5. Is this the long-awaited end for Flash? Plus: Java was the riskiest software in 2014; BEC scam cost $215 last year; NFL data interceptions.

  • January 29, 2015 29 Jan'15

    The politics of DDoS response

    Reports of a 'hack back' DDoS attack by Sony stirred up acceptable use questions.

  • January 28, 2015 28 Jan'15

    FTC urges vendors to create Internet of Things security and privacy controls

    An FTC report urges vendors to be proactive in creating Internet of Things security and privacy controls, while a Tripwire survey shows IoT devices are a growing corporate risk.

  • January 27, 2015 27 Jan'15

    Qualys finds GHOST: Critical Linux remote code execution flaw

    A critical Linux vulnerability, called GHOST, has been found to affect glibc versions released since 2000, and could pose a remote exploit risk on many Linux systems.

  • January 26, 2015 26 Jan'15

    Adobe issues emergency weekend fix for Flash zero-day flaw

    Adobe's latest Flash zero day patch came Saturday, just two days after reports that the vulnerability was being exploited by drive-by-download attacks.

  • Sponsored News

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Five Top Considerations in Architecting Your Network for the Future

      Network architects have more choices than ever when it comes to data center switches. From emerging categories such as white box switches to new powerful cloud spine switches built on custom chip sets, networks can now be designed with maximum flexibility to address a diverse range of price/performance requirements. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    • FAQ: A Guide to Increasing Automation in Data Center Switching

      By increasing automation in data center networks, IT decision makers can reduce costs and complexity, improve uptime, enhance agility and future-proof their network architectures. The issue is not whether to increase automation, but how to do so most effectively and cost-efficiently. See More

    View All Sponsored News
  • January 23, 2015 23 Jan'15

    Detection vs. prevention: Ponemon report points to controversial trend

    A Ponemon Institute report highlights the biggest risks to endpoint security, and what IT professionals plan to do to fight back, including one controversial tactic in malware protection.

  • January 23, 2015 23 Jan'15

    Patchapalooza: In 2015, software patches, software security flaws surge

    News roundup: An of onslaught Adobe, Oracle, OpenSSL, Chrome and Firefox patches highlights the sad state of software security in 2015. Plus, security budgets increasing; security woes; false-positive alerts cost millions annually.

  • January 23, 2015 23 Jan'15

    CryptoWall 3.0: Ransomware returns, adopts I2P

    Shortly after CryptoWall began using TOR to conduct transcations, a new version of the ransomware, dubbed CryptoWall 3.0, has begun using I2P.

  • January 22, 2015 22 Jan'15

    Report: Popularity of biometric authentication set to spike

    Juniper Research claims that the popularity of biometric authentication will rise dramatically in the next five years, incorporating innovative technology beyond today's fingerprint sensors and voice authentication systems.

  • January 21, 2015 21 Jan'15

    Report: More than 90% of 2014 data breaches could have been prevented

    The Online Trust Alliance finds that over 90% of data breaches resulting in data loss could have been prevented.

  • January 21, 2015 21 Jan'15

    Wasted spending on security shelfware affects small businesses more

    Osterman Research and Trustwave report that organizations waste money on underutilized security software because IT often doesn't have enough time or resources to use it.

  • January 20, 2015 20 Jan'15

    ISACA: Majority of enterprises report cybersecurity workforce shortage

    In its new 2015 Global Cybersecurity Status Report, ISACA finds that most organizations are aware of cyberattack risk, but few believe they have the capability to thwart a sophisticated attack.

  • January 19, 2015 19 Jan'15

    Android vulnerability highlights Google's controversial patch policy

    WebView vulnerabilities in older versions of Android are putting the majority of Android devices at risk. Google will not provide patches, forcing enterprises to determine the risk posed by unpatched Android devices.

  • January 19, 2015 19 Jan'15

    Google's Project Zero reveals another Windows zero-day vulnerability

    For the third time in one month, Microsoft couldn't meet Google's 90-day public disclosure deadline, leading to Project Zero's disclosure, though experts say this Windows zero-day vulnerability may have little value to attackers.

  • January 16, 2015 16 Jan'15

    Hardware security issues prove tough to find, harder to fix

    News roundup: Recently discovered firmware flaws highlight the challenges posed by hardware security. Plus: Heartland's breach warranty; RSA's overhaul; and's app (in)security.