Security

Security | News, how-tos, features, reviews, and videos

CSO slideshow - Insider Security Breaches - Flag of China, binary code
Admission tickets in an digital network / access / admittance / authorization / authentication

DDOS attack

Misconfigured WS-Discovery in devices enable massive DDoS amplification

Researchers were able to achieve amplification rates of up to 15,300%. Some mitigations are possible.

Botnet Trouble / Botnet army

Secrets of latest Smominru botnet variant revealed in new attack

Researchers gained access to a Smominru command-and-control server to get details on compromised devices and scope of the attack.

Facebook headquarters

Why France and Germany fear Facebook’s cryptocurrency – and plan to block it

France and Germany are the latest nations to come out against cryptocurrencies, saying they will block Facebook's Libra as it poses a risk to consumers and “the monetary sovereignty” of European nations.

Firefox

Mozilla first reveals, then conceals, paid support plan for Firefox

For more than a week, Mozilla touted a service called 'Mozilla Enterprise Client Support' for Firefox, then pulled the information off its website.

tf19 054 thumb
video

All about U.S. tech antitrust investigations | TECH(feed)

Four large tech companies -- Apple, Amazon, Google and Facebook are under investigation in the U.S. for allegedly anticompetitive behavior. These antitrust investigations on both the federal and state levels are aimed at uncovering...

mozilla firefox primary

Mozilla previews Firefox VPN, will charge for service at some point

The company's Firefox Private Network is an extension that encrypts traffic between Firefox and websites to better secure user data and privacy.

yx7mvik

Lemonade is changing the way we insure our homes

Your home can be broken into or destroyed by a natural disaster when you least expect it. When that happens, how will you get back on your feet? Ideally, you would’ve been paying homeowner’s or renter’s insurance to cover your...

yx7mvik

Lemonade is changing the way we insure our homes

Your home can be broken into or destroyed by a natural disaster when you least expect it. When that happens, how will you get back on your feet? Ideally, you would’ve been paying homeowner’s or renter’s insurance to cover your...

yx7mvik

Lemonade is changing the way we insure our homes

Your home can be broken into or destroyed by a natural disaster when you least expect it. When that happens, how will you get back on your feet? Ideally, you would’ve been paying homeowner’s or renter’s insurance to cover your...

yx7mvik

Lemonade is changing the way we insure our homes

Your home can be broken into or destroyed by a natural disaster when you least expect it. When that happens, how will you get back on your feet? Ideally, you would’ve been paying homeowner’s or renter’s insurance to cover your...

Hands typing on a laptop keyboard binary code and a hazard symbol on screen.

New NetCAT CPU side-channel vulnerability exploitable over the network

NetCAT takes advantage of Intel DDIO technology to remotely execute keystroke timing attacks.

Internet of Things (IoT) / security alert / wireless network management

IoT vendors ignore basic security best practices, CITL research finds

New measurements by the CITL mass fuzzing project show just how bad things really are--and how IoT device makers could radically increase binary security with one day of engineering work.

Multi-factor authentication (MFA) / two-factor authentication (2FA) / one-time security code

2fa explained: How to enable it and how it works

Two-factor authentication (2fa) is a method of establishing access to an online account or computer system that requires the user to provide two different types of information. It can boost security for anyone using any kind of online...

top offers for cyberthreats and security software

Top offers for cyberthreats and security software for September 2019

Explore this week’s top software for virus protection and device security. Take advantage of current offers on privacy control and cyberthreats for a stress free and safe life. PCWorld has the latest offers and coupons on electronics...

nw hpe networking chief keerti melkote

HPE's vision for the intelligent edge

HPE plans to incorporate segmentation, artificial intelligence and automation into its wired and wireless gear in order to deal with the increased network challenges imposed by IoT and SD-WAN.

tf19 052 thumb
video

FTC fines YouTube, but do fines really encourage change? | TECH(feed)

The FTC hit yet another tech company with a seemingly massive fine for mishandling user data. This time, YouTube, owned by Google, is forced to pay $170 million for collecting data about children under 13 without parental consent. The...

United States national government cybersecurity  >  Diverse hands surround/protect the U.S. Capitol.

Leader of new NSA Cybersecurity Directorate outlines threats, objectives

Director Anne Neuberger says her group will focus on ransomware, threats to US elections, and nation-state influence operations.

SMS phishing / smishing  >  Mobile phone displays text bubble with skull + crossbones

SMS-based provisioning messages enable advanced phishing on Android phones

Attackers can use this vulnerability to send highly credible phishing messages. Victims' internet traffic is then routed through the attacker's proxy.

Load More