Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

Android apps (2)
malware attack cyberespionage code hacker

scream wheelbarrow nightmare

How to wake the enterprise from IoT security nightmares

Solutions present and future for IoT security scares that keep you up at night

Legal law gavel hammer courts

Microsoft’s standing to sue over secret US data requests in question

The company has objected in a lawsuit to unreasonable US government requests for customer data

Computer monitor with pixelated locks for security breach

Fake news alert! Internet breaches are not cloud breaches

Ignorant reporting conflates the internet with the cloud; as a result, people lose trust in what is actually a very secure platform

signature signing contract handwriting cursive

Oracle to Java devs: Stop signing JAR files with MD5

Starting in April, if a JAR file is signed with MD5, Oracle will treat it as unsigned

mind the gap sign

Skills gap could hold back blockchain, AI, IoT advancements in 2017

CompTIA finds that IT is poised for great growth in 2017, but with big skills gaps for emerging tech, and security still tough to get right

20151027 oracle cloud on building 100625234 orig

Oracle patches raft of vulnerabilities in business applications

The company's quarterly patch update includes a total of 270 security fixes for many products

internet data

How—and why—you should use a VPN any time you hop on the internet

We'll show you how to protect your online privacy as governments around the world, including the U.S., step up their online surveillance efforts

beach tide summer sand

Passwords: A long goodbye

The campaign to repeal and replace passwords with more secure authentication is making progress. But even those involved say it will be a long time before they disappear

assange on balcony

WikiLeaks’ Assange confident of winning 'any fair trial' in the US

Assange had earlier promised to face US extradition if Chelsea Manning was granted clemency, which she was on Tuesday

p1170191 1

Can a DDoS attack on Whitehouse.gov be a valid protest?

A software engineer wants to take down the Whitehouse.gov site to oppose Trump's inauguration

Digital Key encryption

Sensitive access tokens and keys found in hundreds of Android apps

A new study performed by cybersecurity firm Fallible on 16,000 Android applications revealed that around 2,500 had API keys and access tokens for third-party services hard-coded into them.

1 darkweb marketplace

The unseemly world of Darkweb marketplaces

Find out the various characteristics of a variety of underground markets that offer services for cyber criminals to profit from

151119 paris attacks 2

Terrorists are winning the digital arms race

Countries need to work together to craft an online counternarrative, security experts say

security group team circuitry

The war for cybersecurity talent hits the Hill

The workforce shortage of cybersecurity workers in the U.S. currently is at 300,000 or more, experts estimate

keys

Google ventures into public key encryption

Google's Key Transparency project offers a model of a public lookup service for encryption keys

security training ts

Got microservices? You'd better secure them

Our modern world of containers and microservices presents new challenges that open new vulnerabilities if left unaddressed

Closeup of combination safe

Mobile is still the safest place for your data

IT likes to fret about smartphones and tablets, but more established technologies—even paper documents—are where the data-breach risks lie

Digital Key encryption

Google Cloud Platform finally offers key management service

Google prides itself on its encryption efforts, but it lags behind Amazon and Microsoft in providing encryption tools for the cloud

Load More