Security Channel

Network security news, reviews, and advice on malware defense, data security, hacker countermeasures, and security management.

Security Articles

Data protection authorities find privacy lapses in majority of mobile apps

One in three applications request excessive permissions, and privacy information is inadequate in 85 percent of them, a study found

Yahoo says it faced $250,000 daily fines for defying U.S. surveillance requests

Yahoo's disclosure about government threats comes amid newly unsealed court documents

How Google's tiff with certificate authorities can impact you

Certificate authorities want Google to give websites more time to make security changes before issuing warnings through the Chrome browser

Enemies no more, McAfee and Symantec agree to share threat data

Pair join Fortinet and Palo Alto in the recently launched Cyber Threat Alliance aimed at tackling cyber security threats

3 security practices IoT will disrupt

The rush to bring IoT products to market has created a new wave of security issues

Five million Gmail addresses and passwords dumped online

The data was not likely stolen from Google, but from other websites, researchers said

Internet Explorer steals the Patch Tuesday spotlight again

There are four new security bulletins from Microsoft this month, including one critical update that addresses a zero-day flaw

Cloud security: We're asking the wrong questions

The outcry over celebrity nudes blames a new scapegoat -- the cloud -- for our security woes, but underlying causes run deeper

Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat updates

The new Flash Player update patches 12 vulnerabilities, many of which could allow remote code execution

Comcast's open Wi-Fi hotspots inject ads into your browser

By injecting JavaScript ads into your browser, Comcast could be creating unintended security vulnerabilities

Security White Paper

Information Security and Multi-Compliance

It’s common for information security managers to be held responsible for situations where they have little control or... more

Security Blog entry

Let your worst fears be your guide

Your computer security defense should be built with the assumption that all attackers are trusted, highly privileged insiders... more

Security White Paper

ITCi White Paper: Challenges and...

The Payment Card Industry Data Security Standard (PCI DSS) provides an enterprise structure for improving operational, security,... more

Cloud security: We're asking the wrong questions
SECURITY ADVISER
Cloud security: We're asking the wrong questions

Blog by Roger A. Grimes

The outcry over celebrity nudes blames a new scapegoat -- the cloud -- for our security woes, but underlying causes run deeper
Deep Dives
Digital Spotlight: Cloud Security:

In this Digital Spotlight on Cloud Computing, we tackle these challenges head-on, beginning with an examination of the "notorious nine"....

Download the Identity Management Deep Dive:

Identity management is no laughing matter. Yet a simple glance at today's headlines recounting innumerable hack attacks and data spills....

Download the Whitelisting Deep Dive:

Whitelisting, also known as application control, turns the problem of fighting malware on its head: Rather than attempt to block....

See all Deep Dives
©1994-2014 Infoworld, Inc.