Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

false identity
20160224 stock mwc lenovo booth sign

video

Why ransomware works so well

At Interop 2016, Network World chats with John Pironti, president of IP Architects, about why ransomware is on the rise, and why many consumers and businesses are paying the ransom.

20160224 stock mwc qualcomm booth sign

Qualcomm flaw puts millions of Android devices at risk

Malicious apps could exploit the flaw to access Android users' SMS messages and call histories

video

Early warning signs of a DDoS attack

At Interop 2016, Avi Freedman, CEO of Kentik, chats with Network World about why Distributed Denial of Service (DDoS) attacks are still popular with hackers, why they still work, and some of the signs that an attack may soon commence....

encryption

Tech groups call on presidential candidates to support encryption, embrace other IT issues

Candidates should talk more about cybersecurity and other tech issues, 13 tech trade groups say

eye on computer monitor showing privacy security or breach

Warrantless searches surge as online privacy dwindles

Not only are warrantless searches exploding in number, the boundaries of warrants themselves are expanding

5 simple steps to controlling cloud access

How IT can bring order and accountability to public cloud usage without getting in the way of progress

tablet bug

Why most Android devices won't patch the Qualcomm bug

Qualcomm has patched a high-severity flaw, but handset manufacturers' reluctance to update older models means most of them will remain vulnerable

OS X El Capitan installation

Apple patches vulnerable OS X Git version that put developers at risk

Apple has released a new version of its Xcode development tool in order to patch two critical vulnerabilities in the Git source code management client.

video

Why passwords fail end users

At the 2016 Interop show, Network World got a quick demo of Keeper Security's password management and vault app. The company's CEO, Darren Guccione, also explained why most password methods fail end users, and whether biometrics...

video

Methods hackers use to attack DNS

At 2016 Interop, Cloudmark Engineering Director Angela Knox talks with Network World about several different ways that hackers go after DNS as part of other malicious attacks. Knox explains the methods for DNS ID hacking, spoofing,...

Magnifying glass on top of Best Practices

Linux Foundation tackles open source security with new badge program

The Core Infrastructure Initiative's Best Practices Badge program will help businesses identify which open source projects follow a security-focused methodology

Node.js programming developer

Enterprise Node.js upgrade focuses on security

NodeSource updates its commercially supported JavaScript platform runtime with vulnerability awareness and threshold monitoring

cyber security

OpenSSL patches two high-severity flaws

Versions 1.0.2h and 1.0.1t of the cryptographic library also patch several more bugs of lesser impact

Panama papers

Panama Papers leak explained: What you need to know about the Mossack Fonseca hack

Offshore tax shelters may pay, but scrimping on security doesn't

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world

magician hat wand trick

Admins: Don't wait for ImageMagick patch

Millions of websites are vulnerable to flaws in the ImageMagick image processing tool

planning

How to perform a risk assessment

A risk assessment gives you the information protection equivalent of the opposing team’s playbook, telling where and how attackers are most likely to strike and what the damage will be.

Digital Key, security, encryption

Quantum computers pose a huge threat to security, and the NIST wants your help

An upcoming competition will invite the public to propose and test 'quantum-resistant' encryption schemes

Load More