• November 13, 2015 13 Nov'15

    FBI accused of paying Carnegie Mellon $1M to hack Tor network

    The Tor Project said that the Carnegie Mellon researchers behind an attack on the hidden service subsystem carried out last year were paid $1 million by the FBI to hack Tor network.

  • November 13, 2015 13 Nov'15

    Java vulnerability caused by unpatched open source library

    News roundup: WebSphere, JBoss, Jenkins and more hit by Java vulnerability in an open source library. Plus, SAP HANA deals with critical vulnerabilities, and more.

  • November 11, 2015 11 Nov'15

    November 2015 Patch Tuesday: Font handling strikes again

    Microsoft's November 2015 Patch Tuesday delivers 12 total bulletins, four of which are critical, and one issue with font handling that angers one expert.

  • November 10, 2015 10 Nov'15

    Bluebox tackles mobile application threats for BYOD

    Bluebox Security unveiled a troubling study on mobile application threats and also introduced a new product to protect consumer apps on employee-owned devices.

  • November 10, 2015 10 Nov'15

    NSA vulnerability disclosure policy balances offense and defense

    The NSA published its vulnerability disclosure policy, which aims to balance intelligence benefits with security, but experts said the policy raises more questions than it answers.

  • Sponsored News

    • The Key to Better DevOps Is in Your Data

      DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More

    • How to: Protecting Your Data in the Cloud

      Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Cloud-Based Disaster Recovery

      Our world has become increasingly complex. In the past, the most likely cause of system downtime was either equipment failure or a power outage. Today, there are new threats to your business operations, including data breaches, ransomware and other malicious activities. See More

    View All Sponsored News
  • November 06, 2015 06 Nov'15

    Bad news for encryption security, PKI certificate revocation

    News roundup: Troubling research on PKI certificate revocation; encryption research finds usability lacking; GnuPG adds features. Plus: More zero-days, xCodeGhost still haunting Apple and more.

  • November 05, 2015 05 Nov'15

    Experts: Cyber liability insurance and lawsuits set to improve security

    Cyber liability insurance claims and lawsuits are expected to rise considerably in the next couple years, and experts believe they will lead to improved security for enterprises and developers.

  • November 03, 2015 03 Nov'15

    CSIP aims to modernize U.S. government cybersecurity

    Experts approve of the Cybersecurity Strategy and Implementation Plan issued by the White House to strengthen government cybersecurity guidelines and practices, but worry about implementation.

  • November 02, 2015 02 Nov'15

    CoinVault, Bitcryptor ransomware declared dead following arrests

    CoinVault and Bitcryptor variants of ransomware have been declared dead after the authors were arrested and decryption keys were recovered by law enforcement.

  • November 02, 2015 02 Nov'15

    Cryptowall 3.0 ransomware reported to cost victims $325 million

    A new report analyzed Cryptowall 3.0 ransomware attacks and found that it may have cost victims $325 million and that money may be going to a single source.

  • October 30, 2015 30 Oct'15

    Google slams Symantec over Certificate Transparency trouble

    Google demands Certificate Transparency for all Symantec-issued certificates in wake of last month's escalating disclosures about fake "testing" certificates.

  • October 29, 2015 29 Oct'15

    Congress can still fix CISA privacy issues in reconciliation

    CISA passed the Senate despite complaints over privacy issues, but experts said there is still hope those troubles can be fixed when the bill goes to the House for reconciliation.

  • October 28, 2015 28 Oct'15

    U.S. and E.U. enter into new data sharing agreement

    The European Union and United States have agreed in principle to a new data sharing framework to replace the Safe Harbor pact, but the details of the new rules are still a mystery.

  • October 28, 2015 28 Oct'15

    Disputed Cybersecurity Information Sharing Act passes Senate

    Despite vocal criticism from privacy advocates and technology companies, the U.S. Senate passed the Cybersecurity Information Sharing Act by an overwhelming majority.

  • October 26, 2015 26 Oct'15

    Dridex malware returns despite DOJ arrests

    The Dridex malware has made a return, and attackers are once again using botnets to send the Trojan to banks, despite the Department of Justice making high-profile arrests last month.