News

News

  • July 21, 2015 21 Jul'15

    Microsoft releases out-of-band patch for Windows zero-day

    A Windows zero-day affecting a wide swath of Microsoft products has been found in the Hacking Team data leak, so Microsoft has released an out-of-band patch to fix the vulnerability.

  • July 20, 2015 20 Jul'15

    Black Hat and Google speak out against Wassenaar Arrangement

    The Wassenaar Arrangement is a multilateral export control association aimed at controlling a wide range of goods, including intrusion software. However, Black Hat and Google believe the proposed rules will have a negative impact on security.

  • July 17, 2015 17 Jul'15

    DOJ takes down Darkode, but for how long?

    The U.S. Department of Justice, in coordination with 20 countries, has taken down the computer hacking forum known as Darkode, but experts say the community is already rebuilding.

  • July 17, 2015 17 Jul'15

    Subway app reverse engineering highlights uptick in mobile app safety

    News roundup: Are the tides turning on mobile app safety? One white hat hacker's attempt to reverse-engineer the Subway app offers surprising results. Plus: CloudFlare Transparency Report; another call to eliminate RC4; Black Hat attendant survey.

  • July 16, 2015 16 Jul'15

    Flash Player security failures turn up the hate

    There have been calls for the death of the Adobe Flash Player for years either due to performance issues or the threat of exploit. But with a recent rash of zero-day vulnerabilities, those calls are getting louder.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Choosing the Right Tools to Harness Big Data

      As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • Optimize Your Journey to Azure AD

      For IT managers under pressure to improve security while streamlining costs and resources, the decision to adopt cloud-based applications such as Office 365 is easy. Unfortunately, the transition from on-premises Active Directory to cloud-based Microsoft Azure Active Directory (Azure AD) or a hybrid solution may not be as easy as it would seem. Even those already operating in the cloud could benefit by optimizing their environments. See More

    View All Sponsored News
  • July 15, 2015 15 Jul'15

    More Flash zero-day bugs follow Hacking Team breach

    Researchers discovered two more vulnerabilities in Adobe Flash player stemming from the breach of Italian surveillance software vendor Hacking Team.

  • July 14, 2015 14 Jul'15

    July 2015 Patch Tuesday: Microsoft and Adobe attack Hacking Team zero-days

    July 2015's Patch Tuesday shows both Microsoft and Adobe working fast to patch four Hacking Team zero-day vulnerabilities exposed in the past week.

  • July 14, 2015 14 Jul'15

    Windows Server 2003 end of life leaves many at risk

    The Windows Server 2003 end of life is upon us and many organizations still haven't made the upgrades or security remediations necessary to mitigate the coming risks.

  • July 10, 2015 10 Jul'15

    FBI: We don't want a government backdoor, just access to encrypted data

    News roundup: Despite the benefits of encryption, FBI Director James Comey says it inhibits legal investigations. It's up to tech companies to help. Plus, read about major "computer glitches," Kali 2.0 and more.

  • July 10, 2015 10 Jul'15

    OPM hackers stole 21.5 million records, 1.1 million fingerprints

    Investigators for the OPM data breach find that 21.5 million personal records were stolen in the attack, including 1.1 million fingerprints. The White House is still considering its response.

  • July 10, 2015 10 Jul'15

    Homeland Security chief calls for federal breach reporting law

    The Homeland Security head wants federal laws requiring data breach reporting and information sharing, but one expert warns that government officials need better understanding of infosec technology before creating such laws.

  • July 08, 2015 08 Jul'15

    Industrial espionage group hacked Apple, Facebook, Microsoft

    A mysterious hacker group has hit a number of major U.S. companies with the intent of committing industrial espionage, according to new security research reports.

  • July 08, 2015 08 Jul'15

    Adobe patches Flash zero-day found in Hacking Team data breach

    Adobe patches a Flash zero-day vulnerability found as part of the massive data breach of Hacking Team. Experts recommend speedy remediation as the flaw has been added to multiple exploit kits.

  • July 07, 2015 07 Jul'15

    Critical OpenSSL patch coming Thursday

    The OpenSSL project team will release a critical patch on Thursday and experts warn admins that the upgrade process could take days or weeks to complete.

  • July 06, 2015 06 Jul'15

    Hacking Team internal documents released after massive data breach

    Controversial Italian surveillance software firm, Hacking Team, was attacked, resulting in a 400 GB leak of sensitive data. The response from the Hacking Team was threatening, but may have been part of the attack.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close