News

News

  • October 20, 2015 20 Oct'15

    Report: CIA director's email hacked repeatedly by high school student

    CIA Director John Brennan had his email hacked multiple times, and the hacker found that Brennan stored potentially sensitive information in his AOL email account.

  • October 20, 2015 20 Oct'15

    Social media attacks a growing concern for enterprises

    It's important for online users to understand social media risks and the caution they should use when sharing personal information online.

  • October 19, 2015 19 Oct'15

    Adobe patches Flash zero-day used in foreign ministry attacks

    Adobe has released an emergency patch for Flash zero-day vulnerabilities that have been exploited in the wild in attacks on foreign affairs ministries.

  • October 16, 2015 16 Oct'15

    EMV transition: FBI warns while Target opts for PINs

    News roundup: FBI issues a public service announcement about EMV chip-and-signature cards. Plus: bumper crop of OS X malware in 2015; phishing sites with authenticated certificates and more.

  • October 16, 2015 16 Oct'15

    Automating security, privacy in software programming

    Jean Yang, who created the Jeeves software language, explains why the industry needs to do a better job of enforcing security and privacy policies in its applications.

  • Sponsored News

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Avoid the Pain of Cloud Silos With Unified Management and Visibility

      Hybrid infrastructure is the result of a fundamental evolution of IT to the cloud, and it has become the norm for most midsize and larger organizations. As the prevalence of hybrid environments increases, one of the most confounding and troublesome problems to emerge is a lack of comprehensive management and visibility across the entire IT infrastructure—whether in the cloud or on premises. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    View All Sponsored News
  • October 16, 2015 16 Oct'15

    What does the Consumer Privacy Bill of Rights mean for enterprises?

    The Consumer Privacy Bill of Rights, if made a federal law, would create a uniform set of privacy requirements. Here's a look at the potential benefits.

  • October 15, 2015 15 Oct'15

    Cybersecurity strategy needs to be more dynamic, experts say

    The digital world moves very fast, but a new survey claims that cybersecurity strategy does not move fast enough to keep up with threats -- and experts tend to agree.

  • October 14, 2015 14 Oct'15

    Windows 10 security fixes longtime OS vulnerabilities

    Windows 10 security incorporates years of improvements to remove or mitigate long-term issues with Windows vulnerabilities.

  • October 13, 2015 13 Oct'15

    October Patch Tuesday: The first of 2015 with no zero-day exploits

    Microsoft's October 2015 Patch Tuesday has the fewest number of bulletins of any release this year, and is also the first of the year to not feature any patches related to zero-day exploits.

  • October 13, 2015 13 Oct'15

    Chinese hackers arrested at the request of the US

    China's government has reportedly arrested a number of Chinese hackers suspected of involvement with attacks on the US, but one expert is unsure this will lead to more cooperation between nations.

  • October 09, 2015 09 Oct'15

    Safe Harbor agreement invalid: Privacy win or enterprise woe?

    News roundup: The EU Court has invalidated the Safe Harbor agreement, leaving companies scrambling to deal with overseas data transfers securely. Plus: SHA-1 collision attack; NIST email security initiatives; worry over cyberthreats.

  • October 09, 2015 09 Oct'15

    Vigilante Team White hackers admit to infecting 300,000 devices

    Team White hackers have taken credit for infecting more than 300,000 devices with the Wifatch malware designed to harden security, but experts still question the team's vigilante actions.

  • October 08, 2015 08 Oct'15

    Cybercrime costs rising, experts say application layer needs budget

    Two separate reports noted that cybercrime costs are significant. Some experts said reallocating budget resources to application layer security may be the answer.

  • October 06, 2015 06 Oct'15

    New YiSpecter iOS malware affects non-jailbroken devices

    Malicious actors have found new ways to attack non-jailbroken iOS devices, but experts say the YiSpecter iOS malware may not be as dangerous as it sounds.

  • October 02, 2015 02 Oct'15

    Router malware may be white hat security vigilantism

    An unknown source is infecting thousands of routers with malware not to intentionally cause harm, but apparently as an act of white hat security vigilantism to make the routers safer.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close