• May 05, 2016 05 May'16

    DARPA to build a cyber attribution system to ID criminals

    DARPA has decided to take on one of the most difficult tasks in cybersecurity -- building a cyber attribution system to be able to identify attackers and maybe prevent attacks.

  • May 03, 2016 03 May'16

    Craig Wright fails, again, to prove he's the bitcoin creator

    Craig Wright's second attempt to prove he's the bitcoin creator, Satoshi Nakamoto, was debunked after fooling the mainstream press, but his motives are still a mystery.

  • April 29, 2016 29 Apr'16

    Apple/FBI battle continues over iPhone vulnerabilities

    More fallout from the Apple/FBI conflict: The second iPhone suit was dropped; the FBI can't provide details of a tool used to unlock the San Bernardino shooter's phone.

  • April 28, 2016 28 Apr'16

    PCI DSS 3.2 focuses on encryption and multifactor authentication

    PCI DSS 3.2 marks the start of refining the payment data regulations, rather than minor changes, and includes requirements to strengthen encryption and multifactor authentication.

  • April 26, 2016 26 Apr'16

    Verizon DBIR 2016 shows we haven't learned how to improve security

    The 2016 Verizon DBIR skimps on data breach analysis and instead focuses on common issues, such as phishing, vulnerability management and access controls, which are still befuddling IT pros.

  • Sponsored News

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Choosing the Right Tools to Harness Big Data

      As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More

    • Avoid the Pain of Cloud Silos With Unified Management and Visibility

      Hybrid infrastructure is the result of a fundamental evolution of IT to the cloud, and it has become the norm for most midsize and larger organizations. As the prevalence of hybrid environments increases, one of the most confounding and troublesome problems to emerge is a lack of comprehensive management and visibility across the entire IT infrastructure—whether in the cloud or on premises. See More

    View All Sponsored News
  • April 26, 2016 26 Apr'16

    Simple, yet undetectable Windows AppLocker bypass discovered

    A Windows command-line utility dating back to XP, Regsvr32, reportedly enables a simple and virtually undetectable Windows AppLocker whitelist bypass.

  • April 22, 2016 22 Apr'16

    'Going dark' battle moves to Congressional encryption hearing

    Experts face off in Congress over 'going dark' encryption debate, stake out positions on security, privacy and government access; polls show support for strong encryption.

  • April 21, 2016 21 Apr'16

    Oracle patches now more critically rated with CVSS 3.0

    Oracle patches 136 security flaws in various products and a number of vulnerabilities were rated more critical because of a switch to CVSS 3.0.

  • April 21, 2016 21 Apr'16

    JBoss vulnerability highlights dangers of unpatched systems

    Up to 3.2 million servers with unpatched JBoss vulnerability from 2010 are open to spread ransomware through networks; experts urge keeping up with software patches to stay safe.

  • April 21, 2016 21 Apr'16

    Google's second Android Security Report is a mixed bag

    The second annual Android Security Report details a number of ways Google has been working to improve security on its mobile platform but also highlights persistent problems.

  • April 19, 2016 19 Apr'16

    Apple won't patch zero days so uninstall QuickTime now

    DHS says users need to uninstall QuickTime for Windows immediately as Apple quietly sends the software to its end of life following the disclosure of two zero-day flaws.

  • April 15, 2016 15 Apr'16

    Microsoft fights to notify users of FBI surveillance

    Microsoft has sued the Department of Justice in an effort to be allowed to notify users of FBI surveillance requests; expert worried about continuous surveillance.

  • April 15, 2016 15 Apr'16

    Burr-Feinstein draft bill fuels encryption debate

    The encryption debate continues with release of the official draft of Burr-Feinstein 'Compliance with Court Orders Act of 2016' mandating court order compliance.

  • April 14, 2016 14 Apr'16

    Badlock vulnerability proves a bust for responsible disclosure

    The much-hyped Badlock bug is still important to patch, but raised issues with celebrity vulnerability promotion and responsible disclosure of security vulnerabilities.

  • April 12, 2016 12 Apr'16

    April 2016 Patch Tuesday: Badlock isn't a priority

    Microsoft's April 2016 Patch Tuesday includes a patch for Badlock, a vulnerability which experts call "overhyped," but the most important patches may need extra care to apply.