Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

checkpoint
cyberinsurance thinkstock

Checking mobile phone

Employees put business data at risk by installing gambling apps on their phones

The average company has more than one gambling application installed on some of its employees' mobile devices, and in some cases as many as 35.

hp dma screen shot 2

HP beefs up enterprise security suite with tools to root out malware, app vulnerabilites

Hewlett-Packard has added machine learning analysis capabilities to its Fortify application testing service, and introduced a new service for checking DNS requests for malware attacks.

Verizon to introduce SDN security feature later this month

Verizon will introduce a virtualized firewall service across its global network later this month, part of its move into software-defined networking.

vmworld martin casado

VMware pitches network virtualization for better security

While the idea of network virtualization has been around a while, it has not been adopted in the enterprise as quickly as virtualization for servers. Now, VMware, one of the biggest proponents of virtualizing the entire data center,...

fbi seal

The mission and capabilities of the FBI Cyber Division

Find out about the mission of the Cyber division, the resources available, how best to engage the FBI, among other topics.

people stressed in dark

CSO burnout biggest factor in infosec talent shortage

The real cause of the talent shortage in the information security field isn't a lack of new people entering the profession, but retention and churn at the highest levels, according to a new report by IDC.

The Web's ten most dangerous neighborhoods

Wouldn't it be convenient if all the spam and malware sites were all grouped together under one top-level domain -- .evil, say -- so that they would be easy to avoid? According to a new study from Blue Coat, there are in fact ten...

boardroom

Do boards of directors actually care about cybersecurity?

There’s no shortage of arguments that cybersecurity needs to be aligned with the needs of the business, or that security is now a “boardroom issue.” And it seems that a new report or study is issued every day that states that boards...

cyberthief

Inside the head of your company’s cyber traitor

Employers misjudge how potential insider cyberattackers will judge the risks and payoffs from their crimes.

Researchers find holes in routers supplied by ISPs

Popular Belkin Wi-Fi routers plagued by unpatched security flaws

The Belkin N600 DB wireless dual band router model has unpatched vulnerabilities that could allow hackers to compromise affected devices.

Intel's new power-efficient graphics core

Intel says GPU malware is no reason to panic, yet

Malware that runs inside GPUs (graphics processing units) can be harder to detect, but is not completely invisible to security products.

Bought a brand-new phone? It could still have malware

Security company G Data has identified more than 20 mobile phones that have malware installed despite being marketed as new, according to a research report.

Former Secret Service agent admits $820K Silk Road theft

A former Secret Service agent admitted Monday to stealing $820,000 worth of bitcoins from Silk Road vendors during the investigation of the online contraband market.

Security (3)

Tired of memorizing passwords? A Turing Award winner came up with this algorithmic trick

Passwords are a bane of life on the Internet today, but one Turing Award winner has an algorithmic approach he thinks could make them not only easier to manage but also more secure.

A new version of the sophisticated Duqu malware is used for spying

Russia, China said to use hacked databases to find US spies

Russian and Chinese cyberspying units are reportedly cross-checking hacked databases to identify U.S. intelligence operatives.

Padlock

Attivo brings deception technology to Amazon Web Services

Attivo Networks has upgraded its deception technology so businesses can deploy it within Amazon Web Services cloud to lure attackers to what looks like legitimate physical and virtual machines in order to find out what they are up to....

Global economic/technology prospects: China and the United States of America

U.S. readies sanctions against China for cyber-spying

As the Obama administration prepares to impose sanctions on Chinese companies for economic cyber-espionage, experts question whether the penalties will have significant effect

linksys

Worried about malware on your router? Here's how to keep it safe.

Your router isn't as safe as you think -- malware has infected many of them, and could put you at risk. Here's how to check your router for malware and keep it safe.

Load More