Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
Ask a question
11 hours ago
Not to delve in to the files that were stolen, but I assume most people have heard about the multiple celebrities’ iCloud account that have been breached...
1 Answer |
1 week ago
We have an employee that we strongly suspect of some unethical behavior, without going into further detail. She has a work issued Android phone (a Galaxy S4...
1 week ago
My daughter copied a lot of music and photos from a flash drive onto our family PC a couple of days ago, and it has been running slowly ever since. Even...
2 weeks ago
The San Jose Mercury News reported that Google will start adding whether a website uses HTTPS to the factors that determine its search ranking. Will this be...
4 Answers |
Mozilla has added a defense in its latest version of Firefox that would help prevent hackers from intercepting data intended for major online services.
Traffic is chaotic enough in major cities, but imagine how much worse it would be if a criminal hacker got control of the traffic lights.
In what could turn out to be another huge data breach, Home Depot on Tuesday confirmed that it is investigating a potential compromise of credit card and debit card data belonging to an unspecified number of customers.
Apple has issued a statement regarding the hacking of dozens of celebrities' cellphones that exploded over the weekend.
AlienVault Labs has discovered a watering hole attack that's using a framework developed for reconnaissance as the primary infection vector.
Home Depot said Tuesday it was investigating a possible breach of its systems holding customer payment information tied to credit and debit cards.
Better than 2013 but still not good enough.
That software-defined networking (SDN) is a coming reality is starting to gain traction in IT security circles, with some vendors arguing it could lead to a level of interoperability in security largely missing at present.
It's not ready for prime time yet, but the early builds of a new privacy-focused chat client are promising.
If photos were stolen during a cloud hack, enterprises may be more skittish over cloud use.
White Papers & Webcasts