Security Management

Security Management news, information, and how-to advice

Exploits for dangerous network time protocol vulnerabilities can compromise systems

Systems administrators are urged to install critical patches that address remote code execution flaws in NTP

User ID Password login

Facebook gives away homebrewed OS monitoring tool

Osquery watches for operating system state changes that might indicate a security issue

Microsoft Security Essentials may be throwing false positives for Trojan:DOS/Alureon.J

The precise circumstances are unclear, but it's becoming obvious that MSE in some cases detects a DOS/Alureon.J infection where none exists

A look at the FBI’s big, bad identification system

Next Generation Identification uses a variety of high-tech tools and algorithms to deal with criminal behavior

data breach thinkstock

Data breaches rise as cyber criminals continue to outwit IT

Security breaches rise again this year, costing an average of $415,000, as security pros fail to keep pace with cyber crime innovation

security target

Create your own 'dirty dozen' threat list

Which security events should you worry about most? Everyone has different vulnerabilities, so here's how to prioritize

Enemies no more, McAfee and Symantec agree to share threat data

Pair join Fortinet and Palo Alto in the recently launched Cyber Threat Alliance aimed at tackling cyber security threats

Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat updates

The new Flash Player update patches 12 vulnerabilities, many of which could allow remote code execution

The Home Depot in Knightdale

Hollywood or Home Depot: Whose breach is better?

Trick question, but odds are you were too busy leering at exposed celebs to notice yet another massive security hack

Hackers exploit critical vulnerability in popular WordPress theme component

WordPress admins should check if their sites use the Slider Revolution plug-in and update it immediately, researchers said

Mobile apps could be abused to make expensive phone calls

Mobile applications often don't warn users before a call is made, which a developer says could be misused

Snowden reveals automated NSA cyberwarfare program

MonsterMind could fire back at suspected attackers without human intervention, Snowden says

State-of-the-art spear phishing and defenses

Likelihood and severity of phishing attacks support paying upfront for that ounce of prevention

15 new vulnerabilities reported during router hacking contest

Five popular router models were hacked during the SOHOpelessly Broken competition at DefCon 22

Study finds firmware plagued by poor encryption and backdoors

Firmware within the 'Internet of things' could pose opportunities for hackers, researchers find

Passwords aren't the problem -- we are

A billion stolen passwords or no, we can all benefit from exercising common sense when it comes to online security

On sale: False sense of Internet security, for the low, low price of $120

Is your name among the stash of 1.2 billion stolen passwords? An Internet security firm can tell you -- for pennies per day!

Don't panic: That Russian hack bombshell isn't what you think

News of 1.2 billion stolen Web credentials raises key questions about the data -- and the motives of the security researcher

Network-attached storage devices more vulnerable than home routers

A security review found serious vulnerabilities in 10 popular NAS systems from multiple manufacturers

Load More