Endpoint Security

Endpoint security news, solutions, and analysis for IT professionals

Endpoint Security Blogs

  • How to perform basic API authorization for mobile applications

    Posted January 14, 2014 - 9:00 am

    You have a lot of options to choose from when laying out an authorization structure for mobile applications that communicate with a web API. For basic scenarios with low to medium security requirements, here is a simple strategy.
  • How to block traffic from other countries in linux

    Posted December 27, 2013 - 9:00 am

    It’s a sad fact that the majority of malicious web traffic to US sites originates from the same handful of foreign countries. If your site doesn’t benefit from actual users living in those countries, you may resolve to block them from accessing your site entirely in order to prevent repeated attacks. Here’s how to blacklist entire countries under linux using iptables and ipset.
  • How to prevent SSH from timing out

    Posted December 24, 2013 - 9:00 am

    If you spend a lot of time at the command line you may have run into an annoying issue where your session times out after a relatively brief period of inactivity. While this is desirable from a security perspective, it can cause problems when you’re trying to perform a long running operation. Here’s how to temporarily prevent SSH from timing out.
  • 7 tools that help protect you against the NSA and Google

    Posted October 14, 2013 - 2:26 pm

    Want to protect your privacy in a world filled with surveillance from the National Security Agency, Google, and others? Here are seven apps, services, and tools that many people who worry about the NSA and Google have been flocking to.
  • Next up: The Jamming wars

    Posted August 14, 2013 - 7:00 am

    Personal privacy is going to turn from a "right" to a "fight" in the next decade, as individuals take up (digital) arms against government- and private sector snooping on their personal lives.
  • Black Hat 2013: Rise of the (smart) machines

    Posted August 5, 2013 - 9:35 am

    Don’t let all the light and heat over the NSA’s PRISM program fool you. The big story at this year’s annual Black Hat and DEFCON conferences was the myriad of ways that intelligent machines – from televisions to automobiles to medical devices – are creating new privacy and security risks.
  • iOS app provisioning during member center outage

    Posted August 1, 2013 - 12:00 am

    While most of the services related to the Apple Developer Portal outage have been restored, there is still one component left dark on the live status page that can cause you some problems. Xcode Automatic Configuration.
  • Black Hat: Ad networks lay path to million-strong browser botnet

    Posted July 29, 2013 - 5:01 am

    Long ago, we surrendered our privacy to the web. But research presented at this week’s Black Hat Briefings in Las Vegas suggests that structural problems in the way the web works means we may have also surrendered our security, as well.
  • Apple Developer Portal down for 8th straight day

    Posted July 26, 2013 - 8:00 am

    As you may have seen or heard, the Apple Developer Portal has been down for over a week now after a reported security breach. This has been causing a significant headaches for the iOS developer community, and the most frustrating part is that there is no timeline for restoration.
  • Review

    PasswordBox - One password to rule them all?

    Posted July 2, 2013 - 8:00 am

    There has been some degree of hype recently around the start up PasswordBox. Their goal is near to my heart - create a single solution to manage all of your username and passwords online. With high hopes I jumped in line for their 1 Million account giveaway and was supplied with an account in just a few days.
  • How to validate password strength using a regular expression

    Posted June 11, 2013 - 12:00 am

    Password strength requirements are a hot topic as of late due to a slew of compromised sites and services exposing millions of user accounts to hackers. To no one’s surprise, the most used passwords are embarrassingly weak. “password” anyone?
  • Mobile vendors go their own way on security at FTC event

    Posted June 4, 2013 - 4:12 pm

    Mobile phone makers were in agreement that the security and privacy of their customer was their top concern. But that was about all they could agree on
  • Cyber's Strangelovian moment?

    Posted February 25, 2013 - 10:03 pm

    A steady drumbeat of news about sophisticated cyber attacks against our government and leading institutions has attendees at this year's RSA conference in a fever. And that may be bad for security.
  • Security stories to watch: Security firm Bit9 hacked. Also: Microsoft megapatch and identity management

    Posted February 11, 2013 - 4:20 pm

    The hack of security firm Bit9 reminds us that application whitelists work great at stopping malware ... until they don't. And: Microsoft prepares a mystery 'double patch' of the Internet Explorer web browser, fueling speculation.
  • The Weekly Hash - February 8, 2013

    Posted February 8, 2013 - 12:35 pm

    From the world’s new largest prime number to the key to BlackBerry 10’s success in Canada to one group not happy with all the bugs Microsoft is squishing, we make fun of some of the this week’s top tech stories
  • OpenX Ad Server Exploits - How to remove one and protect yourself

    Posted January 4, 2013 - 9:00 am

    Unfortunately OpenX has taken some poorly thought out and executed measures to attempt to monetize their open source version of the software which has introduced some major security flaws.
  • vSphere upgrade saga: Upgrading to vCNS 5.1

    Posted December 10, 2012 - 3:23 pm

    vCNS 5.1 replaces vShield 5.1, and if you do not add new nodes during your installation, you can easily perform all upgrades without removing any components of vShield. vCNS upgrades will upgrade all components of vShield.
  • Hacked drones could become missiles over U.S., researchers warn

    Posted June 28, 2012 - 6:14 pm

    The FAA's plan to allow as many as 30,000 observation drones to fly over the U.S. by 2015 could be catastrophic, especially the big planes FedEx plans to use to cut delivery costs. GPS spoofing can confuse drones and give attackers "a missile" to direct as a weapon, not an instrument of rescue or law enforcement, researcher warns.
  • New tools finally give users a way to enforce their own privacy

    Posted June 28, 2012 - 12:45 pm

    A rush of new products are designed to add "military grade" encryption to email, text messages and corporate data. None are perfect; none are revolutionary. Collectively they represent acceptance, for the first time, that users should have tools to keep their data secure even from their own employers and tech suppliers.
  • MI-5 chief warns of "astonishing," industrial-scale state-sponsored cybercrime

    Posted June 26, 2012 - 4:32 pm

    The head of the British MI-5 counter-intelligence agency warned yesterday that state-sponsored efforts at cyberattacks had escalated into industrial-scale events involving thousands of people. Who is leading the charge? Superpowers like his government's closest ally.
  • Malware raids bank accounts with no warning to show what happened

    Posted June 20, 2012 - 12:38 pm

    The Zeus and SpyEye Trojans are pretty effective at stealing financial data from victims, but they're not good at actually raiding bank accounts without having to try to hide warning screens. New malware adds an Automatic Transfer System to let your Trojans move money from your bank accounts without bothering you for approvals or signatures or calls to 911.
  • Google finds 9,500 new threat sites per day

    Posted June 20, 2012 - 11:24 am

    On the fifth anniversary of its Safe Browsing initiative, Google has opened up about some of the risks it sees trending and what it's been doing about them. Mainly it warns users, many of whom ignore warnings about legitimate sites that have been compromised by malware.
  • Senator calls for limit on peeping by Apple, Google spyplanes

    Posted June 19, 2012 - 4:11 pm

    Apple and Google are fighting for dominance in the mapping/personal navigation market with high-res photos taken from "spy planes" showing more detail of cities, houses, power and water infrastructure and, Senator worries, people sunbathing in their own back yards.
  • Fujitsu cracks 923-bit painfully complex crypto

    Posted June 19, 2012 - 3:15 pm

    Fujitsu has announced a team it was leading was able to break the 923-bit "pair based encryption" during an experiment it used to establish the credibility in business products of a crypto standard mainly the province of academics.
  • 'Premium Security' for Android is actually the Zeus super Trojan

    Posted June 19, 2012 - 9:29 am

    It's almost routine to see malware packaged and labeled as security software for Android. It's unusual to see the scam hiding one of the more capable, adaptable data-thieving Trojans still found in the wild.
Join us:






Join today!

See more content
Ask a Question