News

News

  • October 20, 2017 20 Oct'17

    Google Play bug bounty hunts RCE vulnerabilities

    A Google Play bug bounty program, run by Google and HackerOne, asks testers to hunt for remote code execution vulnerabilities in some of the top Android apps.

  • October 20, 2017 20 Oct'17

    Latest Kaspersky controversy brings new questions, few answers

    The Kaspersky controversy continued this week as the antivirus company responded to several explosive news stories about its relationship with the Russian government.

  • October 20, 2017 20 Oct'17

    Advanced Protection Program locks down Google accounts

    Google's Advanced Protection Program greatly increases the security of user accounts, but the usability trade-offs may not be worth it for average users.

  • October 20, 2017 20 Oct'17

    Microsoft mum on 2013 database breach of bug tracking system

    News roundup: Former employees reveal a 2013 database breach exposed Microsoft's bug tracking system, DHS sets new rules for federal agencies on web, email security, and more.

  • October 20, 2017 20 Oct'17

    Risk & Repeat: DEFCON tackles voting machine security

    In this week's Risk & Repeat podcast, SearchSecurity editors discuss DEFCON's efforts to improve voting machine security in the wake of hacking threats during the 2016 election.

  • Sponsored News

    • Why Windows 10? Why Now? A Guide to Migrating Without Hassle

      Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More

    • Top 4 Ways to Strengthen Security with PC Lifecycle Management

      Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More

    • A Simple Guide to Increasing Productivity and Job Satisfaction Across Your Entire Organisation

      Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More

    • Top 6 Ways to Lower TCO Through PC Lifecycle Management

      If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More

    View All Sponsored News
  • October 18, 2017 18 Oct'17

    ROCA RSA flaw unveils secret keys on wide range of devices

    Researchers disclosed the ROCA RSA vulnerability as a dangerous flaw in the cryptographic code of Infineon chips that could undermine encryption key security for a number of devices.

  • October 17, 2017 17 Oct'17

    KRACK WPA2 flaw might be more hype than risk

    Researchers discover a WPA2 vulnerability and brand it KRACK, but some experts say the early reports overstate the risk of the flaw and downplay the difficulty of an exploit.

  • October 17, 2017 17 Oct'17

    Risk & Repeat: Kaspersky antivirus scans implicated in NSA breach

    In this week's Risk & Repeat podcast, SearchSecurity editors discuss reports implicating Kaspersky antivirus scans in the recently disclosed breach at the National Security Agency.

  • October 13, 2017 13 Oct'17

    DOJ's 'responsible encryption' is the new 'going dark'

    News roundup: The DOJ calls for 'responsible encryption' to comply with court orders. Plus, there's more bad cybersecurity news for banks, and Accenture data in AWS gets exposed.

  • October 12, 2017 12 Oct'17

    DEFCON hopes voting machine hacking can secure systems

    The first official report on voting machine hacking from DEFCON suggests the need for pen testing, basic security guidelines and cooperation from local and federal governments.

  • October 11, 2017 11 Oct'17

    October 2017 Patch Tuesday includes Windows zero-day fix

    The top priority for Microsoft's October 2017 Patch Tuesday goes to a Windows zero-day vulnerability, but IT should also beware of two publicly disclosed flaws.

  • October 11, 2017 11 Oct'17

    Risk & Repeat: Scope of Equifax, Yahoo breaches expands

    In this week's Risk & Repeat podcast, SearchSecurity editors discuss the expanding scope of the Equifax and Yahoo breaches and the long-term effects of these major security incidents.

  • October 11, 2017 11 Oct'17

    Windows 10 patching could make older systems vulnerable

    Microsoft's practice of automatic Windows 10 patching could be uncovering vulnerabilities in older systems that can be exploited by attackers, Google researchers said.

  • October 07, 2017 07 Oct'17

    NSA breach leads to theft of government spy software

    An NSA contractor became the target of a cyberattack after storing agency spying software on a personal device, and this NSA breach has caused a rise in fears regarding Russia.

  • October 06, 2017 06 Oct'17

    Dnsmasq server flaws unmasked and patched by Google

    News roundup: Google researchers find and patch vulnerabilities in the Dnsmasq server that are used widely in routers and IoT devices. Plus, EU-U.S. Privacy Shield challenge and more.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close