Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

Bank Vault protecting data inside
adobe flash player v10 icon

virtual data wave pattern

How data virtualization delivers on the devops promise

Your data could be standing in the way of getting the most out of devops and continuous delivery. It's also a significant security risk in development -- and that's about to get more expensive

Legislation of privacy security keyboard law legal gavel

Criminal defendants demand to see FBI's secret hacking tool

The ability of defendants to confront the evidence against them is 'absolutely essential,' civil rights groups argue

android security

Google's Android N strengthens security core

File-based encryption, Mediaserver hardening, and automatic updates will come to Google's mobile platform this summer

network monitoring

Open source tool watches Linux systems, containers for suspicious activity

New from Sysdig, Falco alerts you to unwanted behaviors, not just in Docker apps, but throughout the system

Linux containers vs. VMs: A security comparison

More vulnerable than virtual machines? In fact, containers have some security advantages

1 linkedin

A hacker is selling 167 million LinkedIn user records

The data includes hashed passwords for 167 million accounts and likely dates back to 2012

email security

Google to shutter SSLv3, RC4 from SMTP servers, Gmail

Google Apps customers who still rely on SSLv3 or RC4 need to update to TLS or face the prospect of no longer being able to send out mail

HPE cybercrime table

Cybercriminals are increasingly embracing a sophisticated business-model approach

Criminal hacking groups can employ HR specialists, marketers, and training gurus, HPE says

online security

A critical flaw in Symantec antivirus engine puts computers at risk of easy hacking

The flaw could be exploited by simply sending a malicious email or tricking users to visit a link

computer data security keyboard hands programming developer

Defend yourself! Build a cyber security database

Attackers have all kinds of data about the threat landscape -- and about your organization, if it happens to be a target. Now's the time to arm yourself with data, too

android with phone

Why Android hasn't beaten Apple in business

Despite significant improvements in recent years, three key realities give iOS the edge in the enterprise

video

Does the iPhone need a ‘panic button’?

A new ‘panic mode’ for your iPhone might help keep your data more secure. And with the current legal decisions regarding Touch ID, this iOS feature is now vital.

linux enterprise

Linux 4.6 boosts container security, adds OrangeFS support

The latest version of the Linux kernel also features more reliable out-of-memory handling, 802.1AE MAC-level encryption, and support for Intel memory protection keys

spying eye cyberespionage surveillance

An HTTPS hijacking click-fraud botnet infects almost 1 million computers

Over the past two years, a group of cybercriminals has infected almost 1 million computers with malware that hijacks search results, even when they're served over encrypted HTTPS connections.

Digital Key, security, encryption

Security researchers crack new version of CryptXXX ransomware

An updated decryptor tool can help users recover files affected by the CryptXXX ransomware program

sharepoint teper and Virk

5 ways Microsoft has improved SharePoint security

Revamped SharePoint platform enables more granular security controls, hybrid cloud and on-premise auditing, and BYO encryption keys

screenshot 2016 05 16 08 46 06 2

Google aims to block Flash by default for Chrome users, except for 10 white-listed sites

HTML5 will be the primary experience in Chrome by the fourth quarter of this year

US Capitol

Senators will introduce a bill to limit government hacking warrants

The legislation would block a rule change letting judges issue remote hacking warrants

Load More