• October 26, 2016 26 Oct'16

    Android malware delivery is harder than you might think

    Headlines about Android malware often gloss over just how difficult the process is for a user to install a malicious app on a device. Let's talk about that.

  • October 26, 2016 26 Oct'16

    Clapper, Flashpoint: Dyn DNS DDoS attacker likely not a state actor

    As the dust settles around the Dyn DNS DDoS attack, the perpetrator is most likely not a state actor, according to the director of national intelligence and Flashpoint.

  • October 26, 2016 26 Oct'16

    FBI queried on use of vulnerabilities equities process in Playpen case

    A U.S. district judge grants the defendants in a child porn case the right to know whether the FBI used the vulnerabilities equities process before the hack of the Playpen Tor hidden service site.

  • October 25, 2016 25 Oct'16

    Drammer proves Rowhammer can be used to root Android

    Researchers devised a way to exploit the Rowhammer hardware vulnerability on Android devices and gain root access by using an app with no special permissions.

  • October 24, 2016 24 Oct'16

    Questions still loom after Dyn DNS DDoS disrupts internet access

    Users and companies suffer after Dyn DNS DDoS attacks disrupt access to top sites; links to the Mirai botnet raise more questions, as Dyn mops up.

  • Sponsored News

    • The Key to Better DevOps Is in Your Data

      DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More

    • How to: Protecting Your Data in the Cloud

      Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Cloud-Based Disaster Recovery

      Our world has become increasingly complex. In the past, the most likely cause of system downtime was either equipment failure or a power outage. Today, there are new threats to your business operations, including data breaches, ransomware and other malicious activities. See More

    View All Sponsored News
  • October 21, 2016 21 Oct'16

    Dirty COW Linux vulnerability has existed for nine years

    A Linux vulnerability called Dirty COW has existed in the Linux kernel for nine years and allowed attackers to gain root access to virtually all Linux systems.

  • October 21, 2016 21 Oct'16

    Malicious links led to Clinton campaign and Colin Powell hacks

    Malicious links from the DNC hacker group were responsible for account takeovers and leaked emails from the Clinton campaign chairman and Colin Powell.

  • October 21, 2016 21 Oct'16

    Dyn hit by massive DNS DDoS, Eastern U.S. bears brunt of attacks

    At least two DNS DDoS attacks on Dyn are disrupting access to many popular websites, users and companies on the Eastern U.S. are impacted.

  • October 21, 2016 21 Oct'16

    Mozilla set to dump SHA-1 certificates by early 2017

    Roundup: Firefox browser will reject SHA-1 certificates as soon as Mozilla announces further details relating to the deprecation of the outdated algorithm; plus, Oracle patches and more.

  • October 21, 2016 21 Oct'16

    EU-U.S. Privacy Shield certification process picks up steam, slowly

    After a slow start, some U.S. companies are starting to address the questions and challenges of EU-U.S. Privacy Shield certification. But most haven't started the process.

  • October 19, 2016 19 Oct'16

    Intel chip flaw allows attackers to bypass ASLR protection

    Researchers devised an exploit of an Intel chip flaw that allows an adversary to bypass ASLR protection and potentially boost the effectiveness of an attack on any platform.

  • October 19, 2016 19 Oct'16

    IBM yanks POC code in coordinated vulnerability disclosure

    IBM asks, and researcher pulls proof of concept code from a coordinated vulnerability disclosure, internet explodes.

  • October 18, 2016 18 Oct'16

    Secret Service cybersecurity audit shows 'unacceptable' flaws

    A cybersecurity audit of the U.S. Secret Service found 'unacceptable vulnerabilities' that leave the possibility of insider-threat activity and privacy violations.

  • October 17, 2016 17 Oct'16

    The Shadow Brokers cancel the auction of NSA cyberweapons

    The first auction of NSA cyberweapons didn't generate much money for the Shadow Brokers, so the group is changing tactics with a direct sale of the files.

  • October 14, 2016 14 Oct'16

    Certificate revocation list error strands sites signed by GlobalSign

    Attempting to tidy its root certificates, a mis-issued GlobalSign certificate revocation list left website owners scrambling to address cert errors, restore safe browsing icons.