• October 01, 2015 01 Oct'15

    The EMV liability shift date is here, now what?

    The Oct. 1, 2015 deadline for EMV liability has arrived, though merchants and retailers alike aren't ready for the change.

  • September 25, 2015 25 Sep'15

    Google Project Zero reports more Kaspersky software vulnerabilities

    Kaspersky Lab has fixed some of the vulnerabilities in its antivirus products, but a new report from Google Project Zero reveals there's more work to be done.

  • September 25, 2015 25 Sep'15

    OPM breach widens to 5.6 million fingerprint records

    News roundup: More fingerprint records were stolen during the OPM breach than originally reported. Plus: the $1 million iOS bounty; DHS CISO calls for harsher phishing policies; Safe Harbor in hot water.

  • September 23, 2015 23 Sep'15

    As the CIA enters the picture, iOS malware count up to 4,000

    The largest incident of iOS malware found in the Apple App Store has grown exponentially, as researchers find more than 4,000 apps infected. And the attackers may have been inspired by CIA techniques.

  • September 22, 2015 22 Sep'15

    Internal report on Target data breach reveals glaring security holes

    An internal report on Target's breach, obtained by security reporter Brian Krebs, shows the retailer suffered from major security flaws.

  • Sponsored News

    • The Key to Better DevOps Is in Your Data

      DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More

    • How to: Protecting Your Data in the Cloud

      Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    View All Sponsored News
  • September 22, 2015 22 Sep'15

    Certificate Transparency catches bad digital certificates from Symantec

    Symantec testers created unauthorized Extended Validation certificates, but the bad certificates were caught by the Certificate Transparency log.

  • September 21, 2015 21 Sep'15

    Google wants sites to disable SSLv3 to boost Web security

    Google is trying to drag Web security into 2008 by asking sites to disable SSLv3 and RC4, and setting a minimum transfer security protocol of TLS 1.2.

  • September 21, 2015 21 Sep'15

    App Store iOS malware found after first large-scale attack

    For the first time, a large amount of iOS malware has made it past Apple's App Store security controls, potentially affecting hundreds of millions of users.

  • September 18, 2015 18 Sep'15

    Cisco router malware in the wild more widespread than first believed

    News roundup: Additional research shows a Cisco router implant affects more devices than originally reported. Plus: Let's Encrypt's first cert issued; Tor in the library; the mitigated (but not fixed) iOS AirDrop vulnerability.

  • September 18, 2015 18 Sep'15

    DHS audit details cyber mission failures and future efforts

    An internal audit of the U.S. Department of Homeland Security has been completed, detailing areas where its cyber mission has failed and what plans are in place to make improvements.

  • September 17, 2015 17 Sep'15

    Hacker groups shifting to corporate cyberespionage schemes

    There is a growing concern for cyberespionage in U.S. after a financially motivated hacker group stole inside information to make millions from insider trading schemes.

  • September 16, 2015 16 Sep'15

    Stolen credentials are key to avoiding breach detection

    A new report details how attackers can fly under the radar by using stolen credentials in order to avoid breach detection and forgoing the use of malware in malicious activity.

  • September 15, 2015 15 Sep'15

    Hackers hijack website analytics for black hat SEO and more

    A new report shows that hackers are manipulating the ownership settings of the Google Search Console in order to hijack website analytics for use in black hat SEO campaigns and more.

  • September 11, 2015 11 Sep'15

    Department of Energy latest victim of a government data breach

    The U.S. Department of Energy became the latest government cyberattack victim after a report disclosed the agency had suffered more than 1,000 cyberattacks in a four-year span.

  • September 11, 2015 11 Sep'15

    Cybersecurity Information Sharing Act has 'significant problems'

    A new version of the Cybersecurity Information Sharing Act is scheduled to go in front of the Senate this fall, but one expert said the bill has 'significant problems.'