Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
Ask a question
1 day ago
We have an employee that we strongly suspect of some unethical behavior, without going into further detail. She has a work issued Android phone (a Galaxy S4...
1 week ago
My daughter copied a lot of music and photos from a flash drive onto our family PC a couple of days ago, and it has been running slowly ever since. Even...
1 week ago
The San Jose Mercury News reported that Google will start adding whether a website uses HTTPS to the factors that determine its search ranking. Will this be...
4 Answers |
2 weeks ago
I've been in IT for awhile, and am considering a shift to focus more on security and related technologies, policies, etc. What kinds of...
3 Answers |
2 weeks ago
Maybe I have my tinfoil hat on too tight, but I don’t like the idea of anyone being able to “listen” in on my private conversations. On the other hand, in...
4 weeks ago
The latest Android vulnerability has been called Fake ID, and as I understand it fools the OS by pretending to be a different app. How does it do that, and...
1 Answer |
Based on data gathered over the first six months of 2014, security researchers from IBM X-Force predict that the number of publicly reported vulnerabilities will drop to under 8,000 this year, a first since 2011.
Some visitors to several high-profile websites last week were redirected to browser exploits that installed malware on their computers because of malicious advertisements on those sites.
Netflix has released three internal tools it uses to catch hints on the Web that hackers might target its services.
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach
McAfee, part of Intel Security, has made improvements to its Server Security Suites portfolio with the introduction of performance optimisation and additional management efficiency to increase security for servers in physical, virtualised and Cloud environments.
The cybercriminal gang behind the Kelihos botnet is tricking users into installing malware on their computers by appealing to pro-Russian sentiments stoked by recent international sanctions against the country.
Future versions of the Firefox OS mobile platform will allow users to control application-specific permissions, a feature with both privacy and security benefits that's missing on Android.
A line of routers from a China-based manufacturer has a serious flaw that could allow a hacker to monitor someone's Internet traffic, according to research from Trend Micro.
Smartphones sold in California will soon be required to have a kill switch that lets users remotely lock them and wipe them of data in the event they are lost or stolen.
The U.S. National Security Agency built a "Google-like" search engine to give domestic and international government agencies access to details of billions of calls, texts and instant messages sent by millions of people, according to The Intercept.