HP Expands Enterprise Security PortfolioBy Sean Michael Kerner |
Security Article Published on September 14, 2011HP's new offering integrates and expands its enterprise security offering. Will it provide HP with a higher profile in the security market?
Hot Trends in FirewallsBy Eric Geier |
Security Article Published on September 07, 2011While we hope they're an impregnable line of defense, firewalls have historically had plenty of limitations. How are next-gen firewalls beefing up security?
Beware the 'Apache Killer' DoS Attack By Sean Michael Kerner |
Security Article Published on August 29, 2011The Apache Web server is vulnerable to the so-called 'Apache Killer' tool, yet there are defenses.
Does Adobe Help Chrome Security? By Sean Michael Kerner |
Security Article Published on August 25, 2011Does one of the open source Chrome browser's key differences -- an integrated Adobe flash player -- make it more secure?
Security and Privacy Challenges to Boom in 2012By Stuart J. Johnston |
Security Article Published on August 08, 2011As more and more information is collected in the cloud and by location-based services, privacy challenges become increasingly demanding. Black Hat: Lessons of 9/11 By Sean Michael Kerner |
Security Article Published on August 03, 2011Former CIA operative tells Black Hat that the Stuxnet attack is the Rubicon of our future.
In Defense of Internet Anonymity -- AgainBy Bruce Byfield |
Security Article Published on August 02, 2011In contrast with the Linux community's emphasis on user's rights, Facebook, Google+ and many companies work to limit the protection of user anonymity. Who’s right?
Protect Your Servers from Software AttacksBy Paul Rubens |
Security Article Published on July 06, 2011The technologies used by hackers seem to get ever more destructive. Tech expert Paul Rubens overviews how companies are threatened by Permanent Denial of Service (PDoS) attacks.
Top 4 Free Antivirus SoftwareBy Eric Geier |
Security Article Published on May 05, 2011An overview of free antivirus from AVG, Microsoft, Comodo and avast. Which one's the best?
Guard Your PC Against PDF MalwareBy Lisa Phifer |
Security Article Published on May 04, 2011PDF-based malware is exceedingly common, yet these tips will help safeguard your computer system.
Russia Takes Top Hacking Honors, U.S. LagsBy Sean Michael Kerner |
Security Article Published on April 27, 2011Russia produces more hacking attacks than anywhere, while America falls a few spots in this dubious honor roll.
Leaders in Virtualization Security?By Paul Rubens |
Security Article Published on April 20, 2011An analyst report identifies current leaders in virtualization security, yet notes that these top dogs may lose their perch.
Security Vulnerabilities Rising RapidlyBy Datamation.com Staff |
Security Article Published on April 05, 2011Almost half of all security vulnerabilities did not have a vendor supplied patch by the end of 2010.
McAfee Buys Database Security Vendor SentrigoBy Sean Michael Kerner |
Security Article Published on March 24, 2011The database security vendor's products include a Database Activity Monitoring (DAM) solution that provides virtual patching for database deployments.
Malware Found in Android AppsBy David Needle |
Security Article Published on March 03, 2011Google pulled at least 20 Android apps after the company learned they were infected with malware.
5 Overlooked Threats to Cloud ComputingBy Jeff Vance |
Security Article Published on February 28, 2011Virtual machine-launched attacks, multi-tenancy risks and hypervisor vulnerabilities all challenge cloud computing security.
RSA Security Wrap UpBy Lisa Phifer |
Security Article Published on February 25, 2011This year's RSA security conference spotlighted myriad trends in protecting the enterprise.
GOP Lawmakers Move to Strike Down Net Neutrality RegsBy Kenneth Corbin |
Security Article Published on February 16, 2011Resolution of disapproval drops following a contentious oversight hearing on FCC's authority to impose open Internet regulations on broadband access providers.
Smartphone Security: 10 Key PointsBy Pam Baker |
Security Article Published on February 10, 2011Your smartphone is your greatest security vulnerability, far more than your PC.
Hackers Use Facebook Access as BaitBy Larry Barrett |
Security Article Published on February 04, 2011With more than a half billion users, Facebook is a tempting target for Web miscreants.
Internet Service Back on in EgyptBy Kenneth Corbin |
Security Article Published on February 02, 2011After a week of darkness for embattled nation's ISPs, Internet monitoring firms find that transmissions started to resume Wednesday morning.
Internet, Telecom Networks Shut Down in EgyptBy Kenneth Corbin |
Security Article Published on January 28, 2011Government authorities order communications providers to unplug infrastructure in an effort to curb further protests, a wholesale blackout that an intelligence firm describes as unprecedented in Internet history.
Leahy Sees Momentum for Patent Reform in Obama AddressBy Kenneth Corbin |
Security Article Published on January 26, 2011Senate Judiciary Chairman optimistic that he can press forward controversial effort to overhaul the nation's patent system, pegging the effort to Obama's message of innovation and competitiveness.
House Panel Presses for ISP Data Retention MandateBy Kenneth Corbin |
Security Article Published on January 25, 2011In the face of persistent privacy concerns, members air bipartisan support for industry-wide standard for ISPs to retain user data to share with law enforcement investigating child pornography and other Internet crimes.
Software Lobby Calls China Piracy Pledge 'Incremental Progress'By Kenneth Corbin |
Security Article Published on January 20, 2011China has pledged to implement new auditing tools to ensure the government is purchasing legitimate software, a move that met with cautious praise as a good first step from a leading anti-piracy lobby.
Cisco: Java Attacks on the Rise As Spam DeclinesBy Sean Michael Kerner |
Security Article Published on January 20, 2011Annual security report from Cisco shows the first ever decline in spam volume, but don’t get too optimistic -- other types of attacks are growing.
Blackburn: FCC Headed for 'Congressional Hurricane'By Kenneth Corbin |
Security Article Published on January 18, 2011Incensed at the Federal Communications Commission's move to enact net neutrality rules, GOP lawmaker vows to lead a campaign of curbing agency's regulatory overreach.
NY Rep. Asks Treasury to Blacklist Wikileaks' AssangeBy Kenneth Corbin |
Security Article Published on January 13, 2011New York Republican Pete King asks Treasury Secretary Timothy Geithner to add Wikileaks founder to list of individuals barred from doing business with U.S. firms.
America: A Global Leader in SpamBy Larry Barrett |
Security Article Published on January 13, 2011Stats from the fourth quarter of 2010 show that the U.S. hasn't lost its touch, at least not when it comes hacked PCs.
DoJ Leans on Twitter for WikiLeaks InformationBy Kenneth Corbin |
Security Article Published on January 10, 2011Probing the mass release of secret government documents, the Justice Department goes to court to wrest information from Twitter about principals in the case, including Julian Assange and the Army private accused of facilitating the leak.
Hackers Target Android PhonesBy Larry Barrett |
Security Article Published on January 10, 2011The Android mobile OS is suffering seeing a sharp rise in security attacks, enabled in part by user complacency.
Sourcefire Acquires AV Vendor ImmunetBy Sean Michael Kerner |
Security Article Published on January 06, 2011Commercial open source IPS vendor shells out $21 million for cloud based anti-malware technology.
50 iPad Security AppsBy Troy Dreier |
Security Article Published on December 30, 2010iPad security apps for handling passwords, setting alarms, monitoring cameras, theft prevention and more. Many free iPad security apps.
White House Pledges Crackdown on Online CounterfeitsBy Kenneth Corbin |
Security Article Published on December 14, 2010Senior administration officials talk tough about the illegal trafficking of online goods, zeroing in on health risks such as knock-off pharmaceuticals.
Internet Explorer 9 to Offer Greater PrivacyBy Stuart J. Johnston |
Security Article Published on December 09, 2010The forthcoming browser will allow surfers to prevent advertisers from collecting their profile information.
EU Opens Antitrust Probe Into Google SearchBy Kenneth Corbin |
Security Article Published on December 01, 2010European antitrust authorities announce a formal inquiry into allegations from Google's competitors that the search giant used its market clout to undermine competition.
Senate Panel Passes Controversial Online Piracy BillBy Kenneth Corbin |
Security Article Published on November 18, 2010Legislation that would crack down on websites engaging in trafficking of counterfeit goods and pirated content heads to the Senate floor amid heated opposition from digital-rights groups.
Selecting the Best Data Wiping SoftwareBy Joseph Moran |
Security Article Published on November 18, 2010When you need to delete sensitive information from a computing device, you need the best possible data wiping software.
IT System Patching: Don't DelayBy Scott Alan Miller |
Security Article Published on November 11, 2010Patches from OS and software vendors need to be applied promptly and regularly to prevent downtime and security risks.
USB Devices Aiding Malware AttacksBy Larry Barrett |
Security Article Published on November 10, 2010Security experts say that USB devices play a role in as many as 1 in 8 malware attacks.
Microsoft Patch Tuesday: Light ReleaseBy Stuart J. Johnston |
Security Article Published on November 05, 2010This release will be a marked contrast to recent Patch Tuesdays, in which Microsoft offered long lists of patches.
Cloud Computing and Privacy ConcernsBy Diana Kelley |
Security Article Published on November 04, 2010To best understand the Cloud Computing privacy issue, it is effective to divide the exposure use cases into three categories.
Email Scammers Aim at Military FamiliesBy Larry Barrett |
Security Article Published on November 03, 2010Phishers use unsolicited emails pretending to be from USAA, a financial services firm, to obtain sensitive data.
How Risky is Android Mobile OS Code?By Sean Michael Kerner |
Security Article Published on November 02, 2010The Android mobile OS has in excess of 300 software flaws, according to a commercial code analysis firm. Yet doesn't every OS have its imperfections?
Google Updates Policy After Camera-Equipped Car GaffBy Kenneth Corbin |
Security Article Published on October 25, 2010The search giant freely admits that it failed in protecting users' privacy, conceding that it intercepted emails and passwords over unencrypted wi-fi networks.
Is Facebook Security an Oxymoron?By Mike Elgan |
Security Article Published on October 19, 2010It's time for Facebook and Facebook users to finally get serious about security –- or risk the consequences.
Microsoft Patch Tuesday: 16 PatchesBy Stuart J. Johnston |
Security Article Published on October 08, 2010Within the 16 patches to be released on Tuesday, Microsoft rates four of them as "critical."
White House IP Boss: Digital Piracy Costs U.S. JobsBy Kenneth Corbin |
Security Article Published on October 05, 2010Linking IP enforcement with the economic recovery, Victoria Espinel has high hopes for the Anti-Counterfeiting Trade Agreement as the final draft nears completion and public release.
EFF Heralds Victory After Senate Shelves IP BillBy Kenneth Corbin |
Security Article Published on October 01, 2010Leading digital rights group wins a battle in its fight against what it sees as overreaching Internet infringement legislation, though it acknowledges the war is far from over.
Cyberwar Simulation: Is America Ready?By Kenneth Corbin |
Security Article Published on September 30, 2010Scores of businesses are taking part in Cyber Storm III, a US government simulation intended to explore the ramifications of a major cyberattack.
White House IP Chief Talks Tough on Online PiracyBy Kenneth Corbin |
Security Article Published on September 28, 2010U.S. Intellectual Property Enforcement Coordinator Victoria Espinel touts administration's efforts to crack down on Internet piracy, praises controversial Senate bill to blacklist offending sites.
Improving Windows Server SecurityBy Paul Rubens |
Security Article Published on September 15, 2010Microsoft took down the Waledac spam botnet by gaining control of the domains used by the botnet's herders to issue commands to infected Windows machines.
Hackers Galore: 57,000 New Malware Sites WeeklyBy Larry Barrett |
Security Article Published on September 13, 2010No one can accuse hackers of being lazy. A new report indicates that tens of thousands of malware sites spring up each week.
Will Microsoft Acquire Symantec?By Stuart J. Johnston |
Security Article Published on September 10, 2010Fueled by Intel's planned acquisition of McAfee, some observers speculate that Symantec is on Microsoft's list.
Firefox 4 Set to Improve SecurityBy Sean Michael Kerner |
Security Article Published on September 08, 2010The latest Firefox 4 Beta milestone includes a new security feature as part of Mozilla's continuing push to raise the browser ante versus rivals like Google and its upcoming Chrome 6 browser.
Android Security: 20 Good AppsBy Jeff Goldman |
Security Article Published on September 07, 2010With the right apps, Android phones support a wide range of mobile security functions, including automated backups and virus scanning.
EPIC Slams Google's Privacy MovesBy David Needle |
Security Article Published on September 06, 2010Google says the more streamlined set of privacy policies will be easier for consumers to grasp, but the head of the Electronic Privacy Information Center wants an FTC investigation.
Healthcare IT Make Security, EMRs a PriorityBy Larry Barrett |
Security Article Published on August 25, 2010A new survey of North American hospital IT admins finds that security remains their top concern but the quest to comply with federal regulations is distracting them from their goals.
Google Pays $10k for Chrome FixesBy Sean Michael Kerner |
Security Article Published on August 23, 2010Along with fixing 11 Chrome security vulnerabilities, Google paid security researchers for their discoveries.
iPhone Security Apps: Top OptionsBy Jeff Goldman |
Security Article Published on August 19, 2010iPhone apps for password management, spam prevention and data encryption.
Survey: Staffers Would Purloin Company IPBy Larry Barrett |
Security Article Published on August 18, 2010A survey indicates that about half of employees would purloin enterprise data on their way to a new job.
10 Dangerous Web Malware ThreatsBy Lisa Phifer |
Security Article Published on August 16, 2010Criminals are using SEO and social engineering to attract more targeted victims to fewer URLs.
Handicapping the Global Cybersecurity WarBy Kenneth Corbin |
Security Article Published on August 13, 2010If modern warfare no longer exists without a cyber component, how high are the stakes, and will the United States be ready when the attack comes?
Firefox Plans New Security FeaturesBy Sean Michael Kerner |
Security Article Published on August 06, 2010The popular open source browser will address some security concerns in its forthcoming release, due in August.
Securing Your Virtualized InfrastructureBy Paul Rubens |
Security Article Published on August 05, 2010Virtualization is rapidly gaining adoption, yet corresponding security measure are not as widely used.
Is Twitter Less Secure Than E-mail?By Sean Michael Kerner |
Security Article Published on July 30, 2010New research takes a look at the Twitter crime rate, which is on the rise, but might not be as bad as one would think.
Preview of Black Hat USA 2010By Sean Michael Kerner |
Security Article Published on July 28, 2010This security conference in Las Vegas will spotlight DNS and SSL technology, among other core concerns.
The Myth of the Secure Apple OSBy Paul Rubens |
Security Article Published on July 28, 2010A research report pokes holes in the much-vaunted sense that Apple's OS is highly secure.
Google Accelerates Chrome Development, SecurityBy Sean Michael Kerner |
Security Article Published on July 23, 2010Making a faster browser isn't good enough for Google, which also want to release more often and fund more security research, too.
Firefox Gets 14 New PatchesBy Sean Michael Kerner |
Security Article Published on July 22, 2010Of the 14 Firefox patches, eight address security vulnerabilities that Mozilla calls critical.
Firefox Browser Secured by Dell?By Sean Michael Kerner |
Security Article Published on July 21, 2010Dell has launched a free, secure browser based on wrapping Mozilla's Firefox in a virtualization shell.
Windows 7 Security: 10 PositivesBy Lisa Phifer |
Security Article Published on July 20, 2010For users and businesses considering the move to Windows 7, there are a number of security features that prove attractive.
Does IT Need Independent Backup for Google Apps?By David Needle |
Security Article Published on July 15, 2010New Backify service gives IT, particularly in small to midsize businesses, an option for making sure cloud-based data in Google Apps and social media services are not lost.
Enterprise iPhone Security: Essential AppsBy Jeff Goldman |
Security Article Published on July 12, 2010No, the enterprise has not welcomed the iPhone, yet it has become a dominant workplace handheld nonetheless. How can you make it secure enough for the workplace?
U.S. Launches Cyber Attack Detection ProgramBy - Reuters |
Security Article Published on July 08, 2010Nicknamed "Perfect Citizen," the program will attempt to uncover cyber assaults on private companies and government agencies.