• April 12, 2016 12 Apr'16

    WordPress SSL now free for hosted sites, thanks to Let's Encrypt

    Customers with hosted sites will now have WordPress SSL turned on for free by default, thanks to Let's Encrypt certificates, potentially making a large number of websites more secure.

  • April 08, 2016 08 Apr'16

    Encrypted messaging for all, as WhatsApp encryption announced

    WhatsApp encryption was turned on for all types of messaging, including group chats, which advanced the conversation on 'going dark,' as new encryption legislation draft goes public.

  • April 08, 2016 08 Apr'16

    Vulnerability branding becomes another marketing tool

    Vulnerability branding was once a practice that elevated understanding of flaws and potentially led to better remediation, but now serves as little more than marketing for security researchers.

  • April 07, 2016 07 Apr'16

    OSVDB shutdown leaves questions for vulnerability databases

    OSVDB shutdown, blamed on lack of community support and engagement, raises questions about whether open source vulnerability databases can work and how they can be improved.

  • April 05, 2016 05 Apr'16

    Gmail BREACH attack gets much faster but still easy to stop

    Security researchers updated BREACH attack that would allow a Facebook Messenger or Gmail breach to be performed much faster, but the overall risk is limited.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Choosing the Right Tools to Harness Big Data

      As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • Optimize Your Journey to Azure AD

      For IT managers under pressure to improve security while streamlining costs and resources, the decision to adopt cloud-based applications such as Office 365 is easy. Unfortunately, the transition from on-premises Active Directory to cloud-based Microsoft Azure Active Directory (Azure AD) or a hybrid solution may not be as easy as it would seem. Even those already operating in the cloud could benefit by optimizing their environments. See More

    View All Sponsored News
  • April 01, 2016 01 Apr'16

    Apple-FBI suit dropped, but crypto wars continue

    Roundup: After the Apple-FBI suit, ACLU reports U.S. ramping up crypto wars with All Writs suits for at least 63 iOS, Android devices; Senator Wyden stands up for strong crypto.

  • April 01, 2016 01 Apr'16

    Can cybersecurity spending protect the U.S. government?

    CNAP articulates the right things, as many U.S. government cyber initiatives do, but what has captured the attention of the Beltway is the billion-dollar budget proposals.

  • April 01, 2016 01 Apr'16

    What endpoint protection software is on your short list?

    Roughly half of survey respondents indicated that their organization is shifting away from static scanning as the primary protection for endpoints.

  • March 31, 2016 31 Mar'16

    Ransomware vaccine promises protection, but experts are wary

    A new ransomware vaccine promises to protect against infections by popular ransomware variants like Locky and TeslaCrypt, but experts are wary about implementation and security.

  • March 31, 2016 31 Mar'16

    Badlock flaw hits Samba, Windows and responsible disclosure

    The serious Badlock vulnerability in Windows and Samba, announced three weeks prior to patches, triggers a debate over responsible disclosure of software flaws.

  • March 29, 2016 29 Mar'16

    Report: 1.5 million Verizon Enterprise customer records stolen

    Krebs on Security reports 1.5 million customer contact records were swiped from Verizon Enterprise Solutions and offered for sale on Dark Web; customers are at risk for phishing attacks.

  • March 29, 2016 29 Mar'16

    DOJ finds successful iPhone crack; drops backdoor bid, for now

    The DOJ found a successful iPhone crack to access the San Bernardino, Calif., terrorist's device and dropped the pending legal action against Apple, but only in that one case.

  • March 25, 2016 25 Mar'16

    Congress considers 'going dark' encryption legislation

    Roundup: Sens. Dianne Feinstein and Richard Burr seek support for an encryption legislation draft, as U.S. politicians consider their options to address the 'going dark' problem.

  • March 25, 2016 25 Mar'16

    Outbreak of ransomware attacks hit hospitals, enterprises

    A series of ransomware attacks have been reported at hospitals in the U.S. and Canada, leading to experts recommending automated backup for enterprises.

  • March 24, 2016 24 Mar'16

    FBI iPhone backdoor case on hold, as potential hack surfaces

    The FBI iPhone backdoor case was put on hold temporarily, as reports surfaced of a possible hack that would allow FBI access without the help of Apple.