Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

cybersecurity awareness month banner v3 2
iot attack

ransomware hardware security embedded circuit board integrated controller

ARM builds up security in the tiniest IoT chips

On Tuesday, ARM will introduce processors that are just a fraction of a millimeter across and incorporate the company’s TrustZone technology.


Friday's IoT-based DDoS attack has security experts worried

The cybersecurity attack that relied on IoT connected devices was serious, unusual, and historic

security alert shield protect

The only realistic plan to avoid DDoS disaster

Emergencies like the Dyn DDoS attack will keep occurring. The only solution is a better, more secure internet

ransomware hardware security embedded circuit board integrated controller

Physical RAM attack can root Android and possibly other devices

Researchers have devised a new way to fully compromise Android devices without exploiting any software vulnerability and instead taking advantage of a physical design weakness in RAM chips.

cellular mast tower antenna

French surveillance law is unconstitutional after all, highest court says

Giving government spies unfettered access to everyone's wireless communications is not such a good idea after all


Chinese firm admits its hacked products were behind Friday's massive DDoS attack

Botnets created from the Mirai malware were involved in Friday's cyber attack

world map attacks

Dyn DDoS attack exposes soft underbelly of the cloud

The DDoS attack against Dyn affected numerous websites, but the biggest victims are the enterprises that rely on SaaS for critical business operations

Intel logo

Intel asserts its trademark rights against John McAfee

Use your personal name in connection with your business but not as a trademark, Intel says

security lock code

Windows GDI flaw leads to PowerShell attacks

APT group FruityArmor exploited Windows GDI memory handling to break out of browser sandboxes and launch PowerShell in targeted attacks

police lineup identification

Virtual lineup: Your face is already on file

A new report pulls back the curtain and reveals the ‘Wild West’ of unrestricted facial recognition monitoring by American law enforcement

NSA headquarters

Ex-NSA contractor hoarded two decades' worth of secrets

The former National Security Agency contractor suspected of stealing U.S. hacking tools allegedly was found hoarding two decades' worth of classified materials.

windows server download update install

3 ways Windows Server 2016 is tackling security

Windows Server 2016 could be a generational shift in security on par with Bill Gates’ introduction of Trustworthy Computing in 2002

yahoo mail

Yahoo asks US government for clarity on email scanning controversy

The company asks Director of National Intelligence James Clapper to provide information about the government's request that Yahoo secretly scan customer emails

Common crypto mistakes criminals makes

Stupid encryption mistakes criminals make

Blown cover: Malware authors show how easy it is to get encryption wrong and, in the process, help security pros crack their code

Security online

Flaw in Intel CPUs could help attackers defeat ASLR exploit defense

A feature in Intel's Haswell CPUs can be abused to reliably defeat an anti-exploitation technology that exists in all major operating systems, researchers have found.

patches wall

Monster Oracle update patches database, Java

Oracle's Critical Patch Updates keep getting bigger. The database giant addressed a number of remotely exploitable flaws in Java, MySQL, and Oracle Database this quarter

assange on balcony

Ecuador says it cut WikiLeaks founder's internet access to prevent U.S. election interference

WikiLeaks had accused the U.S. of asking Ecuador to intervene

160711 microsoft 1

Microsoft’s Nadella takes on privacy fears about LinkedIn, Cortana

One Gartner analyst called Cortana 'Big Brother' combined with productivity, and asked some pointed questions about Microsoft's intentions

Load More