News

News

  • July 10, 2015 10 Jul'15

    FBI: We don't want a government backdoor, just access to encrypted data

    News roundup: Despite the benefits of encryption, FBI Director James Comey says it inhibits legal investigations. It's up to tech companies to help. Plus, read about major "computer glitches," Kali 2.0 and more.

  • July 10, 2015 10 Jul'15

    OPM hackers stole 21.5 million records, 1.1 million fingerprints

    Investigators for the OPM data breach find that 21.5 million personal records were stolen in the attack, including 1.1 million fingerprints. The White House is still considering its response.

  • July 10, 2015 10 Jul'15

    Homeland Security chief calls for federal breach reporting law

    The Homeland Security head wants federal laws requiring data breach reporting and information sharing, but one expert warns that government officials need better understanding of infosec technology before creating such laws.

  • July 08, 2015 08 Jul'15

    Industrial espionage group hacked Apple, Facebook, Microsoft

    A mysterious hacker group has hit a number of major U.S. companies with the intent of committing industrial espionage, according to new security research reports.

  • July 08, 2015 08 Jul'15

    Adobe patches Flash zero-day found in Hacking Team data breach

    Adobe patches a Flash zero-day vulnerability found as part of the massive data breach of Hacking Team. Experts recommend speedy remediation as the flaw has been added to multiple exploit kits.

  • Sponsored News

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Five Top Considerations in Architecting Your Network for the Future

      Network architects have more choices than ever when it comes to data center switches. From emerging categories such as white box switches to new powerful cloud spine switches built on custom chip sets, networks can now be designed with maximum flexibility to address a diverse range of price/performance requirements. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    • FAQ: A Guide to Increasing Automation in Data Center Switching

      By increasing automation in data center networks, IT decision makers can reduce costs and complexity, improve uptime, enhance agility and future-proof their network architectures. The issue is not whether to increase automation, but how to do so most effectively and cost-efficiently. See More

    View All Sponsored News
  • July 07, 2015 07 Jul'15

    Critical OpenSSL patch coming Thursday

    The OpenSSL project team will release a critical patch on Thursday and experts warn admins that the upgrade process could take days or weeks to complete.

  • July 06, 2015 06 Jul'15

    Hacking Team internal documents released after massive data breach

    Controversial Italian surveillance software firm, Hacking Team, was attacked, resulting in a 400 GB leak of sensitive data. The response from the Hacking Team was threatening, but may have been part of the attack.

  • July 02, 2015 02 Jul'15

    Why Web browser security is a goldmine for attackers

    Video: Robert 'RSnake' Hansen of WhiteHat Security discusses Web browser security, third-party software vulnerabilities and the sad state of browser security throughout the industry.

  • June 30, 2015 30 Jun'15

    US government passwords stolen and leaked around the Web

    A report reveals that many stolen US government agency passwords traveled across the Web, including credentials from OPM, which was recently breached due to stolen passwords.

  • June 26, 2015 26 Jun'15

    DNS vulnerability found in RubyGems software packaging client

    RubyGems software packaging client was found to have a DNS vulnerability that redirects users to malicious gem servers.

  • June 26, 2015 26 Jun'15

    Click fraud to ransomware: Study highlights dangers of malware lifecycle

    New roundup: Sometimes the least of threats -- such as click fraud -- can end up being the bigger issues -- like ransomware. Plus: U.S. Navy won't let go of XP; U.S./China cyber code of conduct; and more!

  • June 25, 2015 25 Jun'15

    Stolen passwords to blame for OPM breach; director may take the fall

    The OPM director told a Senate hearing that passwords stolen from a contractor led to the OPM breach. Now, her job is on the line and the number of breached records could be on the rise.

  • June 24, 2015 24 Jun'15

    Growing threats make security vulnerability management essential

    At RSA Conference 2015, Qualys CTO Wolfgang Kandek said enterprises need to be smart about how they tackle security vulnerabilities because there are simply too many for organizations to handle.

  • June 23, 2015 23 Jun'15

    Adobe releases emergency Flash zero-day patch

    Adobe releases an emergency Flash Player patch for a zero-day flaw said to be used in a Chinese hacker group's phishing scheme.

  • June 23, 2015 23 Jun'15

    Study: government compliance-based vulnerability remediation is failing

    In its State of Software Security Report, Veracode has found the government has the most vulnerabilities and the lowest rate of remediation in developing Web and mobile apps.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close