Endpoint Security

Endpoint security news, solutions, and analysis for IT professionals

Endpoint Security Blogs

  • IEEE specs way to turn body into a network

    Posted May 21, 2012 - 3:55 pm

    IEEE released the body area networking specification it has been working on since 2008. The spec is designed to work with Bluetooth, not replace it. How long can Bluetooth last against a competitor with better security, reliability and a sexier name (IEEE 802.15.6-2012)?
  • Configuring password complexity in Windows and Active Directory

    Posted May 20, 2012 - 6:00 pm

    You may be a Unix devotee, but if your organization uses both Windows and Unix systems, you need to understand how password complexity is configured on both platforms.
  • Cell-phone snoopers: Privacy Eliminator turns police Do Want to Shouldn't Have

    Posted May 18, 2012 - 5:10 pm

    You have to admit the new generation of data-collection devices able to copy every byte of data from cell phones without even delaying the traffic ticket that became an excuse to steal personal data without a warrant. Cool, but still 3D, physical proof that come technology is so efficient it shouldn't be available even to (especially not to cops)
  • Chicago PD: 'PA,' not 'sound cannon;' Occupy NATO protesters: WHAT? OWWWW!!

    Posted May 15, 2012 - 8:04 pm

    Chicago police plan to use a pair of LRAD sound cannon only as communication devices to broadcast instructions to protesters expected to pack downtown Chicago this weekend to protest the NATO summit, not as the painful crowd dispersers as they were designed to be.
  • Kaspersky doubles up slam at Apple, Mac OS X

    Posted May 14, 2012 - 9:11 pm

    Two Kaspersky Labs top execs publicly and explicitly slammed Apple for poor security in recent weeks as Apple customers go through the pain of growing into malware targets and Kaspersky makes a big push to round up new customers for its cloud security service. Apple users, maybe.
  • How to enforce password complexity on Solaris

    Posted May 12, 2012 - 7:44 pm

    Solaris 10 is the first version of Solaris to provide a complex set of variables for controlling password strength. The /etc/default/passwd file contains a series of parameters -- most commented out when a system is first installed -- that allow you to exercise some fairly rigorous constraints on the passwords your users may select.
  • Science news: Chimps are mean, sneaky bastards

    Posted May 11, 2012 - 5:40 pm

    A chimp named Santino made news three years ago for gathering rocks in the morning to throw at humans in the afternoon. Now he's hiding the rocks and his own anger until it's time to whip out the rocks and have at the enemy, which dumb animals are not supposed to be able to do.
  • Ancient Microsoft Word malware threat returns from the grave

    Posted May 9, 2012 - 11:08 am

    The security patch Microsoft distributed yesterday included a comprehensive patch for the flaws exploited by Duqu; more interestingly, it also included fixes to keep poisoned .RTF files from exploiting same weakness as '90s-era Word Macro viruses.
  • Euro-virus extorts 'fines' from U.S. users with content-piracy accusations

    Posted May 9, 2012 - 10:42 am

    A technically savvy gang of East Europeans that has been extorting money from Europeans using 'Police Trojan' ransomware for two years is also responsible for the rush of ransomware in the U.S., after Americanizing its social engineering pitch, according to TrendMicro.
  • Why will IT STILL not support BYOD?

    Posted May 8, 2012 - 4:08 pm

    Despite years of experience showing cloud and mobile computing not only increase productivity, but make end users happier and reap otherwise-lost hours of work while employees are at home, many IT shops still won't support work using personal devices.
  • Anonymous will leak UFO data, or was trolled again

    Posted May 8, 2012 - 12:31 pm

    Anonymous is disavowing knowledge of a YouTube video warning the collective will leak proof that aliens visit Earth, which is funny, but is just one of a growing list of trolling incidents that hold Anonymous up to ridicule.
  • How to enforce password complexity on Linux

    Posted May 6, 2012 - 8:17 pm

    Enforcing password complexity involves making decisions about how long passwords need to be and whether they must contain a mix of characters -- such as digits, a mix of uppercase and lowercase, or special characters. In general, the rules are not hard to set up, but you need to know both the syntax and the rules to get the outcome you expect.
  • What makes a good password?

    Posted April 29, 2012 - 5:02 pm

    Sound advice against the use of bad passwords has been around for decades. Yet I still find people electing to use passwords like pa55w0rd and login123 as if they'd never heard about password cracking programs. Even technical professionals -- programmers, help desk techs and systems administrators -- sometimes assign really weak passwords to their own and other important accounts. It's become painfully obvious to me that telling people to use good passwords isn't enough. We need to clearly define what a good password is -- and never imply that short or predictable passwords are ever OK.
  • Finding Anonymous in its own images

    Posted April 27, 2012 - 1:28 pm

    For all its influence, Anonymous is little understood, often even by other Anon. Its nature changes with each group of Anon and few perceptions agree. Many explain the Anonymous they see in pictures that illustrate what they do, why and who they see behind those masks.
  • The tablet that changed the whole market for tablets, and isn't a tablet

    Posted April 27, 2012 - 11:58 am

    In three months, Amazon's Kindle Fire went from zero to 54 percent share of the Android tablet market. Its cost and power have changed the choice from iPad vs. everything, to iPad, Kindle Fire, or long justifications of why another choice isn't an obviously bad one
  • Cloud services, recycled hard drives leak critical data; IT doesn't notice

    Posted April 26, 2012 - 3:34 pm

    Studies show a third to half of storage drives hold residual data from other users, much of it confidential, some of it enough to allow identity theft. Cloud services widen the hole by making it possible to leave lots of critical data behind with no chance to check whether you did or not.
  • Kaspersky warns Apple it needs to be more like Microsoft 10 years ago

    Posted April 26, 2012 - 12:04 pm

    Ten or 12 years ago Microsoft got its act together on security, churning out fixes quickly, taking aim at new malware and probing its own products for exploitable flaws. The founder of Kaspersky Labs warns Apple it must do the same or lose its market in a plague of malware.
  • Android malware uses motion to log keystrokes

    Posted April 25, 2012 - 3:07 pm

    Researchers at Penn State University and IBM's Watson Research Center built an app that uses gyroscopes, accelerometers and other motion sensors to monitor every move a user makes and decode from the motion what the user types.
  • Does Anonymous get scarier right before big cybersecurity votes?

    Posted April 25, 2012 - 2:19 pm

    Risk analyses list malware, espionage and user negligence among top threats; Anonymous and other hacktivists are usually farther down the top 10. So why do the alarm bells start ringing about semi-anarchistic protest-hackers as votes on unpopular cybersecurity bills approach?
  • Google can do anything it wants to content you store in Drive

    Posted April 25, 2012 - 11:56 am

    In its Terms of Service Google is probably trying to reserve the right to change the format of your files so you can get them using a PC, phone or tab. It probably doesn't want co-ownership of your copyright to the content, but that's what its new Terms require.
  • MIT hackers play TETRIS on a whole building

    Posted April 23, 2012 - 9:34 pm

    Not every MIT hack is brilliant. Some are the kind of prank any group of bright students could pull off. Not this time. Friday night a group of uber-geek MIT hackers turned the campus' Green Building into a game of Tetris that could be played using a console installed at ground level (with a sign reading DO NOT play TETRIS on the Green Building). Brilliant.
  • Machine gun much cooler than camera in privately owned drone 'copter

    Posted April 23, 2012 - 1:23 pm

    YouTube series FPSRussia entertains by executing Xboxes and a firing off lots of cool things that go 'boom.' The latest shows how adding a submachine gun to a quad-rotor drone creates a manikin-killing, car-destroying death machine your crazy neighbor could build with no trouble.
  • Mac botnet may not be shrinking much after all

    Posted April 23, 2012 - 11:39 am

    Security and anti-virus companies have disagreed all along on how many Macs are infected with the Flashback malware. Dr. Web, which discovered it, claims 650,000; Symantec says 140,000.
  • Malware-infected download knocks last trace of hipster gloss from Instagram

    Posted April 19, 2012 - 4:43 pm

    Instagram, once the not-very-exclusive artistic vision of the hipster iPhone photographer community, lost most of its shine when it was ported to Android, then sold to Facebook. Fake downloads with Russian malware put it out to pasture for good.
  • Next big security risk for home users: Internet connected TV

    Posted April 18, 2012 - 3:25 pm

    Security gurus have been demonstrating the risk of 'smart' TVs and appliances, that support the web but not decent security. Smart malware, spear phising and the demand for botnets may finally get global, commercial hacking operations aim not at your laptop, but your TV.
Join us:






Join today!

See more content
Ask a Question