Topic: Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

Ask a question

Join Now or Sign In to ask a question.
rcook12
1 day ago

What is SED encryption? I saw it in a hard drive description, but I’ve never heard of it before.

2 Answers |
SilverHawk
1 day ago

We have an employee that we strongly suspect of some unethical behavior, without going into further detail. She has a work issued Android phone (a Galaxy S4...

MrsMith
1 week ago

My daughter copied a lot of music and photos from a flash drive onto our family PC a couple of days ago, and it has been running slowly ever since. Even...

catamount
1 week ago

I used to use FreeFileSync a few years ago and liked it, so I recently installed it on a Windows laptop. Unfortunately, they decided to add conduit malware...

3 Answers |
ernard
1 week ago

The San Jose Mercury News reported that Google will start adding whether a website uses HTTPS to the factors that determine its search ranking. Will this be...

Tags: google, HTTPS, SEO |
4 Answers |
mandril
1 week ago

I heard BGP hijacks referred to as a method of mining bitcoins. What is a BJP highjack?

dblacharski
2 weeks ago

Yes, it's true that everyone should know better, and should be backing up data to an off-site facility on a regular basis. But, in...

11 Answers |
tover
2 weeks ago

I've been in IT for awhile, and am considering a shift to focus more on security and related technologies, policies, etc. What kinds of...

Tags: infosec |
3 Answers |
jack12
2 weeks ago

Maybe I have my tinfoil hat on too tight, but I don’t like the idea of anyone being able to “listen” in on my private conversations. On the other hand, in...

2 Answers |
aiden
4 weeks ago

The latest Android vulnerability has been called Fake ID, and as I understand it fools the OS by pretending to be a different app. How does it do that, and...

Based on data gathered over the first six months of 2014, security researchers from IBM X-Force predict that the number of publicly reported vulnerabilities will drop to under 8,000 this year, a first since 2011.
Some visitors to several high-profile websites last week were redirected to browser exploits that installed malware on their computers because of malicious advertisements on those sites.
Netflix has released three internal tools it uses to catch hints on the Web that hackers might target its services.
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach
McAfee, part of Intel Security, has made improvements to its Server Security Suites portfolio with the introduction of performance optimisation and additional management efficiency to increase security for servers in physical, virtualised and Cloud environments.
The cybercriminal gang behind the Kelihos botnet is tricking users into installing malware on their computers by appealing to pro-Russian sentiments stoked by recent international sanctions against the country.
Future versions of the Firefox OS mobile platform will allow users to control application-specific permissions, a feature with both privacy and security benefits that's missing on Android.
A line of routers from a China-based manufacturer has a serious flaw that could allow a hacker to monitor someone's Internet traffic, according to research from Trend Micro.
Smartphones sold in California will soon be required to have a kill switch that lets users remotely lock them and wipe them of data in the event they are lost or stolen.
The U.S. National Security Agency built a "Google-like" search engine to give domestic and international government agencies access to details of billions of calls, texts and instant messages sent by millions of people, according to The Intercept.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness