Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

SSL padlock icon security
phishing cyber theft hacked scam

apple beta

How IT should prep for Apple's public OS betas

Apple will soon roll out a public beta of iOS 11 and macOS High Sierra. Is your IT shop ready for the aftermath?

security incident responder

What it takes to be a security incident responder

A wide range of technical skills and curiosity about the mechanics and goals of an attack are key for effective incidence response.

03 shipping malware
Update

How to remove malware from your Windows PC

Has a malware infection taken your PC hostage? Here's how to clean it out and restore your PC to a pristine state.

linux penguin security

5 things you need to know about Stack Clash to secure your shared Linux environment

Qualys shows that attackers can locally exploit the privilege escalation vulnerability to gain root access over Linux, Solaris and BSD machines. This is bad news for Unix-based servers, and even more so for multi-tenant environments.

blockchain ecosystem

4 ways blockchain is the new business collaboration tool

While the full potential of blockchain is often not understood by business execs, that's not keeping companies from aggressively exploring how the secure, distributed ledger technology can save time and money.

engie drone close up

EU wants to ease commercial drone use with future flight rules

The European Commission wants to make it easier for lightweight drones to fly autonomously in European airspace -- with logistics, inspection services and agricultural businesses set to benefit. Last Friday, the Commission...

Hacking stealing password data

Two years after the OPM data breach: What government agencies must do now

Recent reports show declining grades for government agencies’ efforts to improve cybersecurity. Experts weigh in on what needs to be done.

citizen developers

Your secure developer workstation solution is here, finally!

Developer workstations are high-value targets for hackers and often vulnerable. Now you can protect them using concepts borrowed from securing system admin workstations.

malware

With new dynamic capabilities, will whitelisting finally catch on?

In this age of destructive and fast-spreading malware, companies are giving whitelisting a second look -- and with cloud-based, peer-to-peer whitelists and reputation scoring, the technology now has a chance to be widely adopted.

Mobile security

Rogue cell phone surveillance gives rise to mobile threat defense

University of Washington researchers developed a system to detect cellular anomalies and pinpoint cell phone surveillance devices. The technology could be used to better protect enterprise users, especially when they're traveling.

021317blog software

How to stop wasting money on security shelfware

Investing in security tools that end-up on the shelf or underutilized is not inevitable, and it can be reduced or even eliminated by some proactive and surprisingly simple first steps.

Microsoft resurrects Windows XP patches for second month straight

Microsoft today followed May's unprecedented release of security updates for expired operating systems by issuing another dozen patches for the aged Windows XP.

cybersecurity skills and talent shortage

Why linguistics can't always identify cyber attackers' nationality

The security whodunnit: analyzing the language used in an attack is just one tool to assign attribution, and it’s not always reliable.

img 20170515 140831 01

What Microsoft owes customers, and answers to other 'WannaCry' questions

Microsoft took the unprecedented step of issuing security patches for Windows XP, even though support for it ended in 2014. What does that portend for the future?

hiding in plain sight

Mobile app developers: Make sure your back end is covered

Developers need to make sure they are baking security into the application code and protecting how their apps handle data, but as the so-called HospitalGown security issue shows, they also need to know how the back-end servers and...

biometrics

The best identity management advice right now

We've never been closer to getting pervasive, global identities. And with 2FA/MFA, you get all of the benefit with less of the risk.

robots

Google adds Recaptcha API to Android to block the bots

The revised method for distinguishing people from malware bots should make it easier for mobile users to prove they are human

escape tool

24% off Resqme Keychain Car Escape Tool 2-Pack - Deal Alert

Made in the USA and originally developed for first responders, this 2-in-1 safety and survival tool features a blade for cutting a seatbelt and a spring-loaded steel spike for breaking a side window. Keep in on your keychain, or clip...

Load More