Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

ransomware

video

Early warning signs of a DDoS attack

At Interop 2016, Avi Freedman, CEO of Kentik, chats with Network World about why Distributed Denial of Service (DDoS) attacks are still popular with hackers, why they still work, and some of the signs that an attack may soon commence....

20160224 stock mwc qualcomm booth sign

Qualcomm flaw puts millions of Android devices at risk

A vulnerability in an Android component shipped with phones that use Qualcomm chips puts users' text messages and call history at risk of theft.

video

Why passwords fail end users

At the 2016 Interop show, Network World got a quick demo of Keeper Security's password management and vault app. The company's CEO, Darren Guccione, also explained why most password methods fail end users, and whether biometrics...

video

Methods hackers use to attack DNS

At 2016 Interop, Cloudmark Engineering Director Angela Knox talks with Network World about several different ways that hackers go after DNS as part of other malicious attacks. Knox explains the methods for DNS ID hacking, spoofing,...

boxer fighter punch

10 companies that can help you fight phishing

According to the most recent Verizon data breach report, a phishing email is often the first phase of an attack

encryption

Tech groups call on presidential candidates to support encryption, embrace other IT issues

U.S. presidential candidates should embrace encryption and narrow government access to Internet users' data as part of a comprehensive technology agenda, 13 IT trade groups recommended.

20151005 Cisco headquarters sign

Cisco patch stops attackers from taking over TelePresence systems

Cisco Systems has fixed a critical vulnerability that could allow attackers to take over TelePresence systems, as well as other high-severity flaws in Cisco FirePOWER and Adaptive Security Appliance devices.

OS X El Capitan installation

Apple patches vulnerable OS X Git version that put developers at risk

Apple has released a new version of its Xcode development tool in order to patch two critical vulnerabilities in the Git source code management client.

01 intro

Who is a target for ransomware?

The targets of ransomware change according to victim awareness and willingness to pay. Some adversaries may even widen their delivery vector to encompass multiple demographics to account for market shifts. Here’s a look at their...

Node.js programming developer

Enterprise Node.js upgrade focuses on security

NodeSource updates its commercially supported JavaScript platform runtime with vulnerability awareness and threshold monitoring

Gmail Google Mail

A Russian hacker gave away millions of email credentials for social media votes

Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.

cyber security

OpenSSL patches two high-severity flaws

Versions 1.0.2h and 1.0.1t of the cryptographic library also patch several more bugs of lesser impact

SSL padlock icon

Google turns on HTTPS for all blogspot blogs

All blogs hosted on Google's blogspot.com domain can now be accessed over an encrypted HTTPS connection.

imagetragick logo

Critical flaws in ImageMagick library expose websites to hacking

A tool used by millions of websites to process images has several critical vulnerabilities that could allow attackers to compromise Web servers.

insurance

What is cyber insurance and why you need it

Cyber insurance can't protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur.

enterprise IT drones

Commercial drones gaining altitude with top IT vendors

Enterprise IT vendors didn't have much to say about commercial drones just 18 months ago, but now Cisco, AT&T, Verizon and others are making their moves.

conceptual illustration of flying drones with large eye

4 IT companies allowed to use commercial drones

The Federal Aviation Administration has granted approval for more than 5,000 so-called Section 333 exemptions to operate commercial drones over the past year, and among those getting the go ahead are familiar names in the enterprise...

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world.

Load More