Endpoint Security

Endpoint security news, solutions, and analysis for IT professionals
  • Hacked drones could become missiles over U.S., researchers warn

    Posted June 28, 2012 - 6:14 pm

    The FAA's plan to allow as many as 30,000 observation drones to fly over the U.S. by 2015 could be catastrophic, especially the big planes FedEx plans to use to cut delivery costs. GPS spoofing can confuse drones and give attackers "a missile" to direct as a weapon, not an instrument of rescue or law enforcement, researcher warns.
  • New tools finally give users a way to enforce their own privacy

    Posted June 28, 2012 - 12:45 pm

    A rush of new products are designed to add "military grade" encryption to email, text messages and corporate data. None are perfect; none are revolutionary. Collectively they represent acceptance, for the first time, that users should have tools to keep their data secure even from their own employers and tech suppliers.
  • Phil Zimmermann's followup to PGP: Silent Circle

    Posted June 27, 2012 - 10:49 am

    PGP creator to release encryption service for iPhone and iPad calls, texts, and emails.
  • MI-5 chief warns of "astonishing," industrial-scale state-sponsored cybercrime

    Posted June 26, 2012 - 4:32 pm

    The head of the British MI-5 counter-intelligence agency warned yesterday that state-sponsored efforts at cyberattacks had escalated into industrial-scale events involving thousands of people. Who is leading the charge? Superpowers like his government's closest ally.
  • White Paper

    Malware Security Report: Protecting Your Business, Customers, and the Bottom Line

    Posted June 26, 2012 - 10:45 am

    Protect your business and customers by understanding the threat from malware and how it can impact your online business. This paper highlights how attackers distribute malware, what the profit motivations are for modern criminals, and how cybercriminals have developed attack techniques that allow malware to infect thousands of web sites at once.
  • White Paper

    Protecting Users From Firesheep and other Sidejacking Attacks with SSL

    Posted June 26, 2012 - 10:45 am

    The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Firesheep allows an attacker connected to the local network to monitor the web sessions of other users on that network. As experts proclaimed in reaction to Firesheep, the best solution to the problem is to use TLS/SSL for all connections to web sites, including the home page. Download Protecting Users From Firesheep and other Sidejacking Attacks with SSL to learn how to avoid these attacks.
  • Malware raids bank accounts with no warning to show what happened

    Posted June 20, 2012 - 12:38 pm

    The Zeus and SpyEye Trojans are pretty effective at stealing financial data from victims, but they're not good at actually raiding bank accounts without having to try to hide warning screens. New malware adds an Automatic Transfer System to let your Trojans move money from your bank accounts without bothering you for approvals or signatures or calls to 911.
  • Google finds 9,500 new threat sites per day

    Posted June 20, 2012 - 11:24 am

    On the fifth anniversary of its Safe Browsing initiative, Google has opened up about some of the risks it sees trending and what it's been doing about them. Mainly it warns users, many of whom ignore warnings about legitimate sites that have been compromised by malware.
  • Senator calls for limit on peeping by Apple, Google spyplanes

    Posted June 19, 2012 - 4:11 pm

    Apple and Google are fighting for dominance in the mapping/personal navigation market with high-res photos taken from "spy planes" showing more detail of cities, houses, power and water infrastructure and, Senator worries, people sunbathing in their own back yards.
  • Fujitsu cracks 923-bit painfully complex crypto

    Posted June 19, 2012 - 3:15 pm

    Fujitsu has announced a team it was leading was able to break the 923-bit "pair based encryption" during an experiment it used to establish the credibility in business products of a crypto standard mainly the province of academics.
  • 'Premium Security' for Android is actually the Zeus super Trojan

    Posted June 19, 2012 - 9:29 am

    It's almost routine to see malware packaged and labeled as security software for Android. It's unusual to see the scam hiding one of the more capable, adaptable data-thieving Trojans still found in the wild.
  • Researcher: CIA, NSA may have infiltrated Microsoft to write malware

    Posted June 18, 2012 - 2:46 pm

    Mikko Hypponen, chief research officer of antivirus and security software vendor F-Secure has suggested the ability to suborn both Windows Update and Microsoft security certificates may mean the spies that wrote Stuxnet, Duqu and Flame may be working undercover at Microsoft.
  • Enterprises waste time with revenge counter strikes against hackers

    Posted June 18, 2012 - 12:41 pm

    Frustrated by the increasing frequency of criminal and state-sponsored cyberespionage attacks, some companies are moving toward 'active defense' policies that put them in the role of punisher rather than giving data to cops and letting them make the arrests.
  • Video makes global botnet pandemic look pretty

    Posted June 15, 2012 - 7:00 pm

    Mapping just one minute of global communications among botnets makes it look as if we've been invaded from outer space, not just infected with malware.
  • US troops in Afghanistan to get personal, portable killer drones

    Posted June 15, 2012 - 3:01 pm

    It may not do much to avoid civilian casualties from the kind of covert drone strikes that have Pakistan and the U.S. at odds, but a new generation of drones will give U.S. ground troops the ability to scout territory, attack a distant target and carry their air support in a rucksack.
  • Expert calls LinkedIn's new salted hashes useless

    Posted June 11, 2012 - 5:11 pm

    Security researcher Thomas Ptacek didn't slam LinkedIn for not salting the hashes it used to protect passwords. He slammed it for using the wrong kind of encryption, and for not knowing the difference.
  • Generate and keep really secure passwords for free

    Posted June 8, 2012 - 5:27 pm

    The best way to keep from allowing a data breach at LinkedIn or another breached site from being a disaster for you is to use a different password at each. Secure passwords are impossible to remember, however, so storing them in a free password vault is the only solution.
  • Dull-looking email from printer hides sophisticated malware

    Posted June 8, 2012 - 1:33 pm

    The more interesting a phishing email is the more end users will think about them and the more likely they are to become suspicious. A burst of spam from Russian malware servers disguises itself as the automated delivery of a scan, from a printer, not a person.
  • How many seconds would it take to break your password?

    Posted June 7, 2012 - 8:00 pm

    Want to know how strong your password is? Count the number of characters and the type and calculate it yourself. Or check this list and see how big a difference between a few billion possible combinations a few sextillion possibilities really is.
  • LinkedIn password cracker posted 8 million logins as cry for help

    Posted June 7, 2012 - 12:19 pm

    We've finally found a reason beyond simple profit that hackers post the private information (including logins) of consumers they don't know: to get help cracking the encryption on the passwords they've already stolen.
  • Change your LinkedIn password right now

    Posted June 6, 2012 - 12:11 pm

    Login data for as many as 6.5 million LinkedIn users has been posted on a Russian hacker site. LinkedIn hasn't confirmed the breach, but Tweets confirm many real passwords are on the list. Change your password. Get a password vault. Use different passwords for important sites.
  • Cybercrime isn't where or who you think it is

    Posted June 5, 2012 - 2:40 pm

    The US and China are the most frequent victims of cybercrime, but also house the most frequent perpetrators as well. Yes, there's lots of cybercrime in Eastern Europe, and even a cybercrime-to-cybercrime market in Russia. But the story doesn't stop there.
  • White Paper

    Simplify Your Relationship with Endpoint Security

    Posted June 5, 2012 - 12:00 pm

    Managing endpoint security can be complex, but not out of reach. Understanding the challenges and solutions available are essential in addressing cybercrime. Learn more in the whitepaper Simplify Your Relationship with Endpoint Security.
  • White Paper

    Small Business Endpoint Protection Performance Benchmark Testing Report

    Posted June 5, 2012 - 10:45 am

    Learn how top endpoint solutions compare in the Small Business Endpoint Protection Performance Benchmark Testing Report.
  • White Paper

    Customer Success - Tree In The Glen

    Posted June 5, 2012 - 10:45 am

    Treehouse in the Glen (www.treehouseintheglen.com), a certified Green toy store in Silicon Valley, replaced a variety of security solutions with Symantec Endpoint Protection Small Business Edition. Since deployment, the store has had zero virus infections, system performance has improved, and security management time has dropped from three hours a week to 15 minutes.

Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.


    Learn more

Endpoint SecurityWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question