Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

nsa aerial
keyboard user security

HTTP Chrome

Google's Chrome will soon start warning you more about HTTP pages

A Google effort to push websites to implement encryption is expanding. Starting in October, the company will flag even more HTTP connections as insecure in its Chrome browser.

Mobileye object detection

Your car will eventually live-stream video of your driving to the cloud

With a barrage of sensors, cameras and LiDAR equipment and embedded WiFi, autonomous vehicles are expected to produce an ocean of big data that could reach about 5,800 exabytes in size.

security code big data cyberespionage DDoS

Network management vulnerability exposes cable modems to hacking

Hundreds of thousands of internet gateway devices from around the world, primarily cable modems, are vulnerable to hacking because of a serious weakness in their implementation of the Simple Network Management Protocol.

black man phone cafe upset

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that?

20160224 stock mwc internet of things iot sign

Cloudflare wants to secure IoT connections to the internet

Web optimization and security firm Cloudflare launched a service that could allow IoT manufacturers to protect devices from attacks and deploy patches much quicker.

1 intro insider threat

Sensitive data often follows former employees out the door

Almost 70 percent of employees take data on their way out. Here's how to stop it.

security tools intro slide

9 essential tools for the security-conscious mobile worker

From a webcam cover and laptop lock to a USB port blocker and an encrypted flash drive, we've found some security- and privacy-centered gadgets you will want to keep handy.

multifactor authentication

State-of-the-art multifactor authentication (MFA) technologies

Multifactor authentication offers more, better factors/options to protect credentials and data than ever.

1 measure roi

10 ways CSOs can achieve ROI on a network solution

Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before. Here are 10 points that need to be considered to achieve ROI and deliver payback

blackberry keyone smartphone

BlackBerry KeyOne to launch in US and Canada in late May

The BlackBerry KeyOne, an Android-based smartphone with a hardware keyboard, will be available in the U.S. and Canada from May 31, the phone's maker said Thursday.

shield protection

Foiled! 15 tricks to hold off the hackers

To root out persistent hackers, sometimes you have to get a little creative

20151028 verizon logo innovation center 100624637 orig

Cyberespionage, ransomware big gainers in new Verizon breach report

Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016. Cyberspionage accounted for 21 percent of cases analyzed, up from 13 percent last year, and was the most...

img 20170426 133354 01

Ransomware attacks are taking a greater toll on victim's wallets

The hackers spreading ransomware are getting greedier. In 2016, the average fee to free computers hit with the notorious infection rose to $1077, up from $294 the year before, according to security firm Symantec.

p1170405

Companion mobile app exposed Hyundai cars to potential hijacking

The mobile application that accompanies many Hyundai cars exposed sensitive information that could have allowed attackers to remotely locate, unlock and start vehicles.

hacker hack attacke cyber malware keyboard

McAfee: Wave of Shamoon cyberattacks coordinated by a single group

The campaigns are bigger and more sophisticated, and they're causing far more damage as the attackers learn new techniques and collaborate with other groups

Open Source sign in yellow field against blue sky

Open source security risks persist in commercial software [Infographic]

Black Duck’s second annual Open Source Security and Risk Analysis report shows that commonly used infrastructure components have high-risk vulnerabilities.

img 20170425 105827 01

Russian hackers use OAuth, fake Google apps to phish users

The Russian hacking group blamed for targeting U.S. and European elections has been tricking victims into handing over login credentials with fake Google security applications.

img 20170425 150053 01

Old Windows Server machines can still fend off hacks. Here's how

Keeping a computer up-to-date, with the latest OS and software patch, is one of the best things you can do to stay safe from cyber threats.

Load More