News

News

  • November 06, 2015 06 Nov'15

    Bad news for encryption security, PKI certificate revocation

    News roundup: Troubling research on PKI certificate revocation; encryption research finds usability lacking; GnuPG adds features. Plus: More zero-days, xCodeGhost still haunting Apple and more.

  • November 05, 2015 05 Nov'15

    Experts: Cyber liability insurance and lawsuits set to improve security

    Cyber liability insurance claims and lawsuits are expected to rise considerably in the next couple years, and experts believe they will lead to improved security for enterprises and developers.

  • November 03, 2015 03 Nov'15

    CSIP aims to modernize U.S. government cybersecurity

    Experts approve of the Cybersecurity Strategy and Implementation Plan issued by the White House to strengthen government cybersecurity guidelines and practices, but worry about implementation.

  • November 02, 2015 02 Nov'15

    CoinVault, Bitcryptor ransomware declared dead following arrests

    CoinVault and Bitcryptor variants of ransomware have been declared dead after the authors were arrested and decryption keys were recovered by law enforcement.

  • November 02, 2015 02 Nov'15

    Cryptowall 3.0 ransomware reported to cost victims $325 million

    A new report analyzed Cryptowall 3.0 ransomware attacks and found that it may have cost victims $325 million and that money may be going to a single source.

  • Sponsored News

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Avoid the Pain of Cloud Silos With Unified Management and Visibility

      Hybrid infrastructure is the result of a fundamental evolution of IT to the cloud, and it has become the norm for most midsize and larger organizations. As the prevalence of hybrid environments increases, one of the most confounding and troublesome problems to emerge is a lack of comprehensive management and visibility across the entire IT infrastructure—whether in the cloud or on premises. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    View All Sponsored News
  • October 30, 2015 30 Oct'15

    Google slams Symantec over Certificate Transparency trouble

    Google demands Certificate Transparency for all Symantec-issued certificates in wake of last month's escalating disclosures about fake "testing" certificates.

  • October 29, 2015 29 Oct'15

    Congress can still fix CISA privacy issues in reconciliation

    CISA passed the Senate despite complaints over privacy issues, but experts said there is still hope those troubles can be fixed when the bill goes to the House for reconciliation.

  • October 28, 2015 28 Oct'15

    U.S. and E.U. enter into new data sharing agreement

    The European Union and United States have agreed in principle to a new data sharing framework to replace the Safe Harbor pact, but the details of the new rules are still a mystery.

  • October 28, 2015 28 Oct'15

    Disputed Cybersecurity Information Sharing Act passes Senate

    Despite vocal criticism from privacy advocates and technology companies, the U.S. Senate passed the Cybersecurity Information Sharing Act by an overwhelming majority.

  • October 26, 2015 26 Oct'15

    Dridex malware returns despite DOJ arrests

    The Dridex malware has made a return, and attackers are once again using botnets to send the Trojan to banks, despite the Department of Justice making high-profile arrests last month.

  • October 23, 2015 23 Oct'15

    Google to adopt strictest DMARC policy to fight spam, phishing

    News roundup: Google to implement strictest DMARC policy in anti-phishing campaign. Plus: CISA is coming, the health care industry is lagging and SHA-1 is failing.

  • October 22, 2015 22 Oct'15

    Experts say Oracle patches need to be faster

    Oracle patches 154 flaws in its quarterly update. Experts said patches need to be released faster, but Oracle stands by its release schedule.

  • October 21, 2015 21 Oct'15

    Trend Micro acquires HP TippingPoint for $300 million

    Trend Micro agreed to purchase HP TippingPoint for $300 million in an effort to bolster network security, but experts disagree on the strategy of either company involved.

  • October 20, 2015 20 Oct'15

    Report: CIA director's email hacked repeatedly by high school student

    CIA Director John Brennan had his email hacked multiple times, and the hacker found that Brennan stored potentially sensitive information in his AOL email account.

  • October 20, 2015 20 Oct'15

    Social media attacks a growing concern for enterprises

    It's important for online users to understand social media risks and the caution they should use when sharing personal information online.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close