Topic: Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

Ask a question

Join Now or Sign In to ask a question.
ttopp
9 hours ago

Not to delve in to the files that were stolen, but I assume most people have heard about the multiple celebrities’ iCloud account that have been breached...

hughye
3 days ago

I have NFC capabilities in my phone, but I’ve never had a use for it so it’s always turned off. However, there are some efforts to use NFC in smartphone for...

Tags: mobile payments, NFC |
1 Answer |
rcook12
6 days ago

What is SED encryption? I saw it in a hard drive description, but I’ve never heard of it before.

2 Answers |
SilverHawk
6 days ago

We have an employee that we strongly suspect of some unethical behavior, without going into further detail. She has a work issued Android phone (a Galaxy S4...

MrsMith
1 week ago

My daughter copied a lot of music and photos from a flash drive onto our family PC a couple of days ago, and it has been running slowly ever since. Even...

catamount
2 weeks ago

I used to use FreeFileSync a few years ago and liked it, so I recently installed it on a Windows laptop. Unfortunately, they decided to add conduit malware...

3 Answers |
ernard
2 weeks ago

The San Jose Mercury News reported that Google will start adding whether a website uses HTTPS to the factors that determine its search ranking. Will this be...

Tags: google, HTTPS, SEO |
4 Answers |
mandril
2 weeks ago

I heard BGP hijacks referred to as a method of mining bitcoins. What is a BJP highjack?

dblacharski
2 weeks ago

Yes, it's true that everyone should know better, and should be backing up data to an off-site facility on a regular basis. But, in...

11 Answers |
tover
2 weeks ago

I've been in IT for awhile, and am considering a shift to focus more on security and related technologies, policies, etc. What kinds of...

Tags: infosec |
3 Answers |
Hosting provider Namecheap said Monday hackers compromised some of its users' accounts, likely using a recently disclosed list of 1.2 billion usernames and passwords compiled by Russian hackers.
While conducting a penetration test of a major Canadian retailer, Rob VandenBrink bought something from the store. He later found his own credit card number buried in its systems, a major worry.
Attackers deploy Web-based reconnaissance tool to gather information about potential targets in different industries
Europol launched a cybercrime task force Monday to fight online crime in the EU and other countries.
A file-encrypting ransomware program called CryptoWall infected over 600,000 computer systems in the past six months and held 5 billion files hostage, earning its creators more than US$1 million, researchers found.
Former U.S. Secretary of State Hillary Clinton called for a "global compact" on surveillance and the use of collected data, saying the U.S. isn't the only country that does it and American technology companies are unfairly targeted for the government's actions.
Electric carmaker Tesla Motors wants security researchers to hack its vehicles. The Silicon Valley based high-tech carmaker will hire up to 30 full-time hackers whose job will be to find and close vulnerabilities in the sophisticated firmware that controls its cars.
Two recent vulnerabilities are examples of problems that could have been avoided if we had just applied the lessons already learned in similar contexts.
Windows XP users may now download a fourth service pack for the 13-year-old operating system, but it isn't coming from Microsoft.
The growing number of data breaches resulting in massive numbers of payment cards being stolen from retail stores and other businesses is occurring because they're failing to keep up with the Payment Card Industry's data security standard, according to the PCI Security Standards Council.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness