• October 21, 2016 21 Oct'16

    Dirty COW Linux vulnerability has existed for nine years

    A Linux vulnerability called 'Dirty COW' has existed in the Linux kernel for nine years and allowed attackers to gain root access to virtually all Linux systems.

  • October 21, 2016 21 Oct'16

    Malicious links led to Clinton campaign and Colin Powell hacks

    Malicious links from the DNC hacker group were responsible for account takeovers and leaked emails from the Clinton campaign chairman and Colin Powell.

  • October 21, 2016 21 Oct'16

    Dyn hit by massive DNS DDoS, Eastern U.S. bears brunt of attacks

    At least two DNS DDoS attacks on Dyn are disrupting access to many popular websites, users and companies on the Eastern U.S. are impacted.

  • October 21, 2016 21 Oct'16

    Mozilla set to dump SHA-1 certificates by early 2017

    Roundup: Firefox browser will reject SHA-1 certificates as soon as Mozilla announces further details relating to the deprecation of the outdated algorithm; plus, Oracle patches and more.

  • October 21, 2016 21 Oct'16

    EU-U.S. Privacy Shield certification process picks up steam, slowly

    After a slow start, some U.S. companies are starting to address the questions and challenges of EU-U.S. Privacy Shield certification. But most haven't started the process.

  • Sponsored News

    • The Key to Better DevOps Is in Your Data

      DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More

    • How to: Protecting Your Data in the Cloud

      Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Cloud-Based Disaster Recovery

      Our world has become increasingly complex. In the past, the most likely cause of system downtime was either equipment failure or a power outage. Today, there are new threats to your business operations, including data breaches, ransomware and other malicious activities. See More

    View All Sponsored News
  • October 19, 2016 19 Oct'16

    Intel chip flaw allows attackers to bypass ASLR protection

    Researchers devised an exploit of an Intel chip flaw that allows an adversary to bypass ASLR protection and potentially boost the effectiveness of an attack on any platform.

  • October 19, 2016 19 Oct'16

    IBM yanks POC code in coordinated vulnerability disclosure

    IBM asks, and researcher pulls proof of concept code from a coordinated vulnerability disclosure, internet explodes.

  • October 18, 2016 18 Oct'16

    Secret Service cybersecurity audit shows 'unacceptable' flaws

    A cybersecurity audit of the U.S. Secret Service found 'unacceptable vulnerabilities' that leave the possibility of insider-threat activity and privacy violations.

  • October 17, 2016 17 Oct'16

    The Shadow Brokers cancel the auction of NSA cyberweapons

    The first auction of NSA cyberweapons didn't generate much money for the Shadow Brokers, so the group is changing tactics with a direct sale of the files.

  • October 14, 2016 14 Oct'16

    Certificate revocation list error strands sites signed by GlobalSign

    Attempting to tidy its root certificates, a mis-issued GlobalSign certificate revocation list left website owners scrambling to address cert errors, restore safe browsing icons.

  • October 14, 2016 14 Oct'16

    Pork Explosion opens Android backdoor, roasts branded vulnerabilities

    The Pork Explosion flaw in the app bootloader provided by Foxconn creates an Android backdoor which could give an attacker dangerous levels of access.

  • October 14, 2016 14 Oct'16

    Odinaff banking Trojan linked to Carbanak group, attacks SWIFT

    The Odinaff banking Trojan has been found targeting the SWIFT messaging system at financial institutions around the world and may have links to the infamous Carbanak group.

  • October 14, 2016 14 Oct'16

    Adobe patches 83 vulnerabilities in latest crop of fixes

    News roundup: As Adobe patches 83 vulnerabilities in Flash Player, Acrobat and Reader, the good news is none have been exploited in the wild -- yet. Plus, IoT threats and more.

  • October 13, 2016 13 Oct'16

    Hackers leverage 12-year-old OpenSSH vulnerability for IoT attack

    Akamai researchers discovered how unknown threat actors are using an SSH flaw to secretly gain control of IoT devices and turn them into proxies for malicious traffic.

  • October 13, 2016 13 Oct'16

    Researchers demonstrate undetectable encryption backdoor in crypto keys

    Academic researchers show how to place undetectable encryption backdoors in cryptographic keys and passively decrypt data, which could undermine confidence in certain algorithms.