Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

Glowing band-aids on red background
yahoo mail

gottfried leibbrandt ceo swift sibos 2016

Swift CEO reveals three more failed attacks on banking network

Banks stopped three new attempts to abuse the Swift financial transfer network this summer, its CEO Gottfried Leibbrandt said Monday, as he announced Swift's plan to impose tighter security controls on its customers.

password security

Your users have porous passwords? Blame yourself, IT.

Your efforts at raising security awareness could be making users feel that it’s pointless to try to protect themselves.

red apple

How to mitigate hackers who farm their victims

Feeling raked over? You’re not alone; someone is probably probing your low hanging fruit right now. CSO covers how hackers farm the enterprise and how companies can mitigate the risks.

00 intro

10 ways to secure a mobile workforce

As much as you might want to implement all the latest best practices and lock down your company like Fort Knox, you need to align your policies to your company culture.

Yahoo

Yahoo's claim of 'state-sponsored' hackers meets with skepticism

Yahoo has blamed its massive data breach on a "state-sponsored actor". But the company isn't saying why it arrived at that conclusion. Nor has it provided any evidence.

bluetooth padlock

34% off Master Lock Bluetooth Keyless Outdoor Padlock - Deal Alert

Use your smartphone to open this lock from Master Lock. Share access, monitor access history and receive alerts if someone is tampering. Its shackle offers 2 inch vertical clearance and is made of boron, offering maximum resistance to...

sofacy 1

New Mac Trojan uses the Russian space program as a front

Security researchers have found a new Mac OS X malware that appears to be targeting the aerospace industry.

yahoo headquarters

Va. senator wants SEC probe of massive Yahoo breach

U.S. Sen. Mark Warner, D-Va., on Monday urged the U.S. Securities and Exchange Commission to investigate whether Yahoo met its legal obligations to keep the public and investors informed about a massive breach of 500 million Yahoo...

security code big data cyberespionage DDoS

Armies of hacked IoT devices launch unprecedented DDoS attacks

The botnets made up of compromised IoT devices are now capable of launching distributed denial-of-service attacks of unprecedented scale.

microsoft dcu malware lab

Here's how Microsoft is walling off malware to protect Edge users

Microsoft is aiming to better protect users and organizations from the threats that they face in the browser with a new feature called Windows Defender Application Guard. It's designed to isolate Microsoft Edge from the rest of the...

illusive networks swift guard

Illusive Networks seeks to slow Swift attackers through deception

Today's savvy bank robbers don't break into vaults looking for gold or diamonds: They're more likely to be hacking networks looking for access to the Swift payment system.

microsoft dcu malware lab

Here's how Microsoft is using containerization to protect Edge users

Microsoft is aiming to better protect users and organizations from the threats that they face in the browser with a new feature called Windows Defender Application Guard. It's designed to isolate Microsoft Edge from the rest of the...

hilary clinton stage

Hillary Clinton’s email has vanished but why can’t yours?

Experts agree that recent high-profile cases demonstrate that emails can be permanently destroyed. But they also warn against complacency. They still recommend treating emails as if they really are “forever.”

intro

New products of the week 9.26.16

Our roundup of intriguing new products from companies such as Dell and HPE.

5 checklist

What’s in your code? Why you need a software bill of materials

When developers and suppliers carefully list the tools used to build an application and what third-party components are included, IT can improve software patching and updates

Chip and

Trump hotel chain fined over data breaches

Trump Hotel Collection has arrived at a settlement with New York Attorney General Eric T. Schneiderman over hacks that are said to have led to the exposure of over 70,000 credit card numbers and other personal data.

security of things

How to keep terrifying medical device hacks from becoming reality

More medical devices are becoming connected ones, and that’s increasing the security threat surface, said panelists this week at the Security of Things Forum in Cambridge, Mass.

dhs security

Cisco, IBM may be interested in buying Imperva

Security vendor Imperva is shopping itself around and may be attractive to the likes of Cisco and IBM, according to Bloomberg.

Load More