• September 18, 2015 18 Sep'15

    Cisco router malware in the wild more widespread than first believed

    News roundup: Additional research shows a Cisco router implant affects more devices than originally reported. Plus: Let's Encrypt's first cert issued; Tor in the library; the mitigated (but not fixed) iOS AirDrop vulnerability.

  • September 18, 2015 18 Sep'15

    DHS audit details cyber mission failures and future efforts

    An internal audit of the U.S. Department of Homeland Security has been completed, detailing areas where its cyber mission has failed and what plans are in place to make improvements.

  • September 17, 2015 17 Sep'15

    Hacker groups shifting to corporate cyberespionage schemes

    There is a growing concern for cyberespionage in U.S. after a financially motivated hacker group stole inside information to make millions from insider trading schemes.

  • September 16, 2015 16 Sep'15

    Stolen credentials are key to avoiding breach detection

    A new report details how attackers can fly under the radar by using stolen credentials in order to avoid breach detection and forgoing the use of malware in malicious activity.

  • September 15, 2015 15 Sep'15

    Hackers hijack website analytics for black hat SEO and more

    A new report shows that hackers are manipulating the ownership settings of the Google Search Console in order to hijack website analytics for use in black hat SEO campaigns and more.

  • Sponsored News

    • The Key to Better DevOps Is in Your Data

      DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More

    • How to: Protecting Your Data in the Cloud

      Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Cloud-Based Disaster Recovery

      Our world has become increasingly complex. In the past, the most likely cause of system downtime was either equipment failure or a power outage. Today, there are new threats to your business operations, including data breaches, ransomware and other malicious activities. See More

    View All Sponsored News
  • September 11, 2015 11 Sep'15

    Department of Energy latest victim of a government data breach

    The U.S. Department of Energy became the latest government cyberattack victim after a report disclosed the agency had suffered more than 1,000 cyberattacks in a four-year span.

  • September 11, 2015 11 Sep'15

    Cybersecurity Information Sharing Act has 'significant problems'

    A new version of the Cybersecurity Information Sharing Act is scheduled to go in front of the Senate this fall, but one expert said the bill has 'significant problems.'

  • September 10, 2015 10 Sep'15

    CAPTCHA-bypassing malware on Android apps found in Google Play Store

    Researchers found advanced CAPTCHA-bypassing malware on Android apps in the official Google Play Store, but Google downplayed the impact.

  • September 09, 2015 09 Sep'15

    IT pros don't get cybersecurity risks around certificate authorities

    A survey of IT professionals at the Black Hat conference shows that understanding of certificate authorities is low, and Venafi believes this could lead to cybersecurity risks.

  • September 08, 2015 08 Sep'15

    September 2015 Patch Tuesday: More critical Microsoft Office fixes

    Microsoft's September 2015 Patch Tuesday is available now and includes five critical bulletins, two of which tackle remote code execution flaws affecting Microsoft Office.

  • September 04, 2015 04 Sep'15

    DOJ Stingray rules require warrant to track mobile phones

    The U.S. Department of Justice announced the establishment of a new policy for cell-site simulator devices that will require law enforcement to obtain warrants in order to track mobile phones.

  • September 03, 2015 03 Sep'15

    OPM breach protection services on the way for 21.5M victims

    The contract for identity theft and credit protection services for OPM breach victims has been awarded, but protection notifications will not be going out to OPM victims until later this month.

  • September 02, 2015 02 Sep'15

    Deception may be next big IT security tool, or may be hype

    A new report claims that deception may become a big factor in the future of IT security tools, but one expert warns that the efficacy of such tactics can diminish with popularity.

  • September 01, 2015 01 Sep'15

    Warnings, neglect and a massive OPM data breach

    Why no one should have been surprised by the massive government Office of Personnel Management data hack.

  • September 01, 2015 01 Sep'15

    Chip and PIN migration slow as EMV deadline approaches

    A major deadline for EMV card adoption is just one month away. Can chip-and-PIN and chip-and-signature technology improve payment card security and reduce fraud?