Security Channel

Network security news, reviews, and advice on malware defense, data security, hacker countermeasures, and security management.

Security Articles

iPhone gets first free app for encrypting voice calls

Open-source Signal app is compatible with RedPhone, its Android sibling

3 zero-day flaws found in Symantec's Endpoint Protection

Security vendor Offensive Security says the flaws could be used to gain full system access

Mobile management: Making sense of your options

There are known, proven approaches to reduce those risks without disabling the benefit of consumerization

BlackBerry adds more security for the sensitive enterprise

BlackBerry says it can offer levels of security that can not be replicated on Apple, Android or other mobile devices

Android vulnerability allows malware to compromise most devices and apps

Attackers can impersonate trusted developers to gain powerful privileges on the OS, researchers from Bluebox Security say

The data dangers of free public Wi-Fi

New York's plan to turn pay phones into free Wi-Fi stations could be a template for other cities, and bad news for IT trying to protect corporate data and IP

How to protect personal, corporate information when you travel

Today's hotels are unfortunately vulnerable to types of attempted fraud. Here's how to keep data safe

Privacy groups call for action to stop Facebook's off site user tracking plans

Authorities should act immediately to stop this new vast expansion of Facebook's data collection and user profiling, US and EU privacy groups said

7 indispensable project management tips

Good project managers are worth their weight in gold -- and earn their keep by following these best practices

Mobile security: A mother lode of new tools

You may know your smartphone, but pretty soon the question will be: How well does your smartphone know you?

Security White Paper

Information Security and Multi-Compliance

It’s common for information security managers to be held responsible for situations where they have little control or... more

Security Blog entry

Let your worst fears be your guide

Your computer security defense should be built with the assumption that all attackers are trusted, highly privileged insiders... more

Security White Paper

ITCi White Paper: Challenges and...

The Payment Card Industry Data Security Standard (PCI DSS) provides an enterprise structure for improving operational, security,... more

7 indispensable project management tips
SECURITY ADVISER
7 indispensable project management tips

Blog by Roger A. Grimes

Good project managers are worth their weight in gold -- and earn their keep by following these best practices
Deep Dives
Digital Spotlight: Cloud Security:

In this Digital Spotlight on Cloud Computing, we tackle these challenges head-on, beginning with an examination of the "notorious nine"....

Download the 'How to Rethink Security' Deep Dive:

here is a pageThe bad guys are persistent, sophisticated, and they are making inroads. It is hard to be optimistic....

Download the Identity Management Deep Dive:

Identity management is no laughing matter. Yet a simple glance at today's headlines recounting innumerable hack attacks and data spills....

See all Deep Dives
©1994-2014 Infoworld, Inc.