Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

tablet bug
OS X El Capitan installation

video

Why passwords fail end users

At the 2016 Interop show, Network World got a quick demo of Keeper Security's password management and vault app. The company's CEO, Darren Guccione, also explained why most password methods fail end users, and whether biometrics...

video

Methods hackers use to attack DNS

At 2016 Interop, Cloudmark Engineering Director Angela Knox talks with Network World about several different ways that hackers go after DNS as part of other malicious attacks. Knox explains the methods for DNS ID hacking, spoofing,...

Magnifying glass on top of Best Practices

Linux Foundation tackles open source security with new badge program

The Core Infrastructure Initiative's Best Practices Badge program will help businesses identify which open source projects follow a security-focused methodology

Node.js programming developer

Enterprise Node.js upgrade focuses on security

NodeSource updates its commercially supported JavaScript platform runtime with vulnerability awareness and threshold monitoring

cyber security

OpenSSL patches two high-severity flaws

Versions 1.0.2h and 1.0.1t of the cryptographic library also patch several more bugs of lesser impact

Panama papers

Panama Papers leak explained: What you need to know about the Mossack Fonseca hack

Offshore tax shelters may pay, but scrimping on security doesn't

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world

magician hat wand trick

Admins: Don't wait for ImageMagick patch

Millions of websites are vulnerable to flaws in the ImageMagick image processing tool

planning

How to perform a risk assessment

A risk assessment gives you the information protection equivalent of the opposing team’s playbook, telling where and how attackers are most likely to strike and what the damage will be.

Digital Key, security, encryption

Quantum computers pose a huge threat to security, and the NIST wants your help

An upcoming competition will invite the public to propose and test 'quantum-resistant' encryption schemes

terrorist tools

Trend Micro: 6 most popular homebrewed terrorist tools

Terrorist are developing apps that include pre-packaged encryption, DDoS, and a news feed for tech-light jihadists

gear rust machinery

4 projects ripe for a Rust rewrite

As Rust matures, projects aimed at reimplementing existing software in a language built for safety become more practical -- and more numerous

jim hunter greenwave

The IoT company behind the curtain

Greenwave Chief Scientist Jim Hunter explores the promise of the Internet of things -- and the challenges it still faces

office printer

Think that printer in the corner isn’t a threat? Think again

Sitting in the corner, sometimes collecting dust, is an overlooked attack surface

20160330 satya nadella build16

Microsoft's CEO explains why his company sued the U.S. government

The company's commitment to privacy drove it to fight gag orders, Satya Nadella says

android security danger

Google renews focus on Mediaserver flaws in latest Android Security Bulletin

Google renamed its monthly security update, but the contents remain the same: remote execution and elevation of privilege bugs in Mediaserver

stopwatch seconds

Tick-tock: Time is running out to move from SHA-1 to SHA-2

Stop procrastinating and make the switch from SHA-1 to SHA-2. You may already be getting errors -- and in 2017 things will get a lot worse

sharing business secrets

How you could be leaking your secrets onto GitHub

Hard coding credentials and pushing the code to GitHub is a common mistake that can lead to exposing sensitive info like Slack tokens or Amazon keys

Load More