News

News

  • December 22, 2014 22 Dec'14

    Staples data breach update: 1.16 million cards, 1,400 stores affected

    An update from the office-supply giant shows that 1.16 million cards and point-of-sale systems at more than 1,400 stores may have been affected.

  • December 22, 2014 22 Dec'14

    Researchers uncover serious NTP security flaws

    According to researchers, the most severe of several newly discovered Network Time Protocol security flaws can be exploited remotely with a single packet.

  • December 19, 2014 19 Dec'14

    Home router security vulnerability exposes 12 million devices

    Check Point has uncovered a widespread home router security vulnerability, dubbed Misfortune Cookie, that could allow attackers to gain control over millions of devices.

  • December 19, 2014 19 Dec'14

    FBI connects Sony Pictures hack to North Korean government

    The investigative U.S. government agency said it found overlap between the malware and infrastructure used in the Sony Pictures hack and other North Korean operations.

  • December 19, 2014 19 Dec'14

    Surviving the Sony Pictures hack: Is the company's future in jeopardy?

    News roundup: As it copes with a devastating, unprecedented cyberattack, Sony Pictures' future as a company could be on the line. Plus: "Operation Cleaver"; labeling HTTP websites "insecure"; and a surge in phishing with malicious links.

  • Sponsored News

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Five Top Considerations in Architecting Your Network for the Future

      Network architects have more choices than ever when it comes to data center switches. From emerging categories such as white box switches to new powerful cloud spine switches built on custom chip sets, networks can now be designed with maximum flexibility to address a diverse range of price/performance requirements. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    • FAQ: A Guide to Increasing Automation in Data Center Switching

      By increasing automation in data center networks, IT decision makers can reduce costs and complexity, improve uptime, enhance agility and future-proof their network architectures. The issue is not whether to increase automation, but how to do so most effectively and cost-efficiently. See More

    View All Sponsored News
  • December 18, 2014 18 Dec'14

    Survey: Guest network security lacking at many businesses

    According to WatchGuard, seven out of 10 restaurants, hotels and other businesses don't take the necessary steps to secure their guest Wi-Fi networks.

  • December 18, 2014 18 Dec'14

    Spear phishing attack led to ICANN compromise

    Attackers used spear phishing emails to swipe credentials from several ICANN staff members and accessed the non-profit organization's systems.

  • December 17, 2014 17 Dec'14

    Sony Pictures data breach update: Hackers threaten film premiere

    The New York opening of Sony Pictures' upcoming comedy The Interview was canceled after threats emerged from the attackers responsible for its recent data breach.

  • December 12, 2014 12 Dec'14

    Sony Pictures hacking back: The ethics of obfuscation

    News roundup: Amid a devastating breach incident Sony Pictures is fighting back, raising legal and ethical questions. Plus: A big week in security acquisitions; Comcast sued over open Wi-Fi; and Yahoo announces vulnerability disclosure policy.

  • December 10, 2014 10 Dec'14

    Sony data breach update: Executives received extortion emails

    Among the new details uncovered this week, Sony executives received extortion emails just days before troves of the company's data were released online as part of a massive breach.

  • December 09, 2014 09 Dec'14

    December 2014 Patch Tuesday features three critical fixes

    Capping a busy year of software updates, Microsoft's December 2014 Patch Tuesday release delivers three critical bulletins; separately Adobe offers a pair of critical fixes.

  • December 09, 2014 09 Dec'14

    Many SMBs still lack controls to limit sensitive data exposure

    Trustwave says one out of every five organizations has no controls in place to prevent sensitive data exposure, despite growing criminal interest.

  • December 09, 2014 09 Dec'14

    FIDO Alliance releases 1.0 specifications for passwordless authentication

    Amid growing fears of stolen credentials and data breaches, the FIDO Alliance released its long-awaited 1.0 specifications for passwordless and multifactor authentication systems.

  • December 05, 2014 05 Dec'14

    How to find malware? It's hidden malware here, there and everywhere

    News roundup: The industry is losing the battle against hidden malware, finding it in unlikely places from sandboxes to e-cigarettes. Plus: Richard Clarke's security tips for CEOs; data loss and downtime cost companies big; and are cheap tablets ...

  • December 03, 2014 03 Dec'14

    Expert: FIN4 phishing attacks show new operational sophistication

    According to one expert, the FIN4 attack group's successful advanced phishing operations prove that phishing attacks can't be thwarted solely with user awareness training.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close