News

News

  • July 27, 2015 27 Jul'15

    Another government data breach: U.S. Census Bureau admits to hack

    The U.S. Census Bureau admits that it was attacked and had data exfiltrated from systems, and one expert says this latest government data breach is another example that federal systems are not safe from attack.

  • July 27, 2015 27 Jul'15

    Valve fixes Steam password bug that led to compromised accounts

    A glaring error in the Steam password recovery system allowed hackers to take over accounts for Valve's popular gaming platform.

  • July 24, 2015 24 Jul'15

    Alleged car hack prompts call for vehicle security act, DMCA exemption

    News roundup: A wireless car hack demonstration has pushed vehicle security legislation and DMCA exemptions into the spotlight, and prompted a manufacturer recall. Plus: Hacking Team update; DHS email issues; and smartwatches vulnerable to attack.

  • July 24, 2015 24 Jul'15

    HP scares IT teams with Windows Phone critical vulnerabilities

    HP's Zero Day Initiative has disclosed four critical vulnerabilities found in Internet Explorer that could lead to remote code execution, but mistakenly labeled them as affecting Windows desktop rather than Windows Phone.

  • July 23, 2015 23 Jul'15

    National Guard breach highlights the risk of accidental data exposure

    The National Guard reported an accidental data exposure affecting thousands of former and current employees was not related to the OPM breach.

  • Sponsored News

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Five Top Considerations in Architecting Your Network for the Future

      Network architects have more choices than ever when it comes to data center switches. From emerging categories such as white box switches to new powerful cloud spine switches built on custom chip sets, networks can now be designed with maximum flexibility to address a diverse range of price/performance requirements. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    • FAQ: A Guide to Increasing Automation in Data Center Switching

      By increasing automation in data center networks, IT decision makers can reduce costs and complexity, improve uptime, enhance agility and future-proof their network architectures. The issue is not whether to increase automation, but how to do so most effectively and cost-efficiently. See More

    View All Sponsored News
  • July 22, 2015 22 Jul'15

    Hackers targeting .NET shows the growing pains of open source security

    According to researchers, malware makers have been targeting .NET since Microsoft made the software open source. And experts debate to what extent open source security can be maintained.

  • July 21, 2015 21 Jul'15

    Microsoft releases out-of-band patch for Windows zero-day

    A Windows zero-day affecting a wide swath of Microsoft products has been found in the Hacking Team data leak, so Microsoft has released an out-of-band patch to fix the vulnerability.

  • July 20, 2015 20 Jul'15

    Black Hat and Google speak out against Wassenaar Arrangement

    The Wassenaar Arrangement is a multilateral export control association aimed at controlling a wide range of goods, including intrusion software. However, Black Hat and Google believe the proposed rules will have a negative impact on security.

  • July 17, 2015 17 Jul'15

    DOJ takes down Darkode, but for how long?

    The U.S. Department of Justice, in coordination with 20 countries, has taken down the computer hacking forum known as Darkode, but experts say the community is already rebuilding.

  • July 17, 2015 17 Jul'15

    Subway app reverse engineering highlights uptick in mobile app safety

    News roundup: Are the tides turning on mobile app safety? One white hat hacker's attempt to reverse-engineer the Subway app offers surprising results. Plus: CloudFlare Transparency Report; another call to eliminate RC4; Black Hat attendant survey.

  • July 16, 2015 16 Jul'15

    Flash Player security failures turn up the hate

    There have been calls for the death of the Adobe Flash Player for years either due to performance issues or the threat of exploit. But with a recent rash of zero-day vulnerabilities, those calls are getting louder.

  • July 15, 2015 15 Jul'15

    More Flash zero-day bugs follow Hacking Team breach

    Researchers discovered two more vulnerabilities in Adobe Flash player stemming from the breach of Italian surveillance software vendor Hacking Team.

  • July 14, 2015 14 Jul'15

    July 2015 Patch Tuesday: Microsoft and Adobe attack Hacking Team zero-days

    July 2015's Patch Tuesday shows both Microsoft and Adobe working fast to patch four Hacking Team zero-day vulnerabilities exposed in the past week.

  • July 14, 2015 14 Jul'15

    Windows Server 2003 end of life leaves many at risk

    The Windows Server 2003 end of life is upon us and many organizations still haven't made the upgrades or security remediations necessary to mitigate the coming risks.

  • July 10, 2015 10 Jul'15

    FBI: We don't want a government backdoor, just access to encrypted data

    News roundup: Despite the benefits of encryption, FBI Director James Comey says it inhibits legal investigations. It's up to tech companies to help. Plus, read about major "computer glitches," Kali 2.0 and more.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close