Security Channel

Network security news, reviews, and advice on malware defense, data security, hacker countermeasures, and security management.

Security Articles

Black Hat presentation on TOR suddenly cancelled

The presentation revolved around a low-budget method to de-anonymize users of the privacy tool

Stealthy Web tracking tools pose increasing privacy risks to users

The use of such tracking tools may be unknown to most users, according to a research paper

EFF releases Chrome, Firefox plug-in to block third-party tracking

One feature of Privacy Badger aims to stop tracking tied to clicking the Facebook 'like' on outside sites

Prove it! Another security vendor claims 100 percent malware detection

A long line of security vendors has promised to detect all malware. Every last one failed. Can Trustwave break the mold?

iOS devices are still safe -- from everybody except Apple and the NSA

Security researcher says undocumented services allow Apple and law enforcement to access the contents of any iOS device

Stealthy 'Critroni' ransomware uses Tor, could replace Cryptolocker

The Cryptolocker takedown has led to a better designed, more resilient ransomware threat

NSA whistleblower Edward Snowden plans to work on easy-to-use privacy tools

Edward Snowden has some plans for the future and they include making privacy and encryption tools easier to use

Ping Identity wants to replace sign-ons with smartphones

PingID allows enterprise users to sign onto any service or system with a swipe of their smartphones

Two glimmers of hope for enterprise security

Will the endless stream of security compromises ever stop? No single security product can deliver salvation, but two new solutions, PingID and Tanium, show real promise

US court says warrant for access to all content of email account is justified

The government was granted a warrant to obtain emails and other information from a Gmail account

Security White Paper

Information Security and Multi-Compliance

It’s common for information security managers to be held responsible for situations where they have little control or... more

Security Blog entry

Let your worst fears be your guide

Your computer security defense should be built with the assumption that all attackers are trusted, highly privileged insiders... more

Security White Paper

ITCi White Paper: Challenges and...

The Payment Card Industry Data Security Standard (PCI DSS) provides an enterprise structure for improving operational, security,... more

Prove it! Another security vendor claims 100 percent malware detection
SECURITY ADVISER
Prove it! Another security vendor claims 100 percent malware detection

Blog by Roger A. Grimes

A long line of security vendors has promised to detect all malware. Every last one failed. Can Trustwave break the mold?
Deep Dives
Digital Spotlight: Cloud Security:

In this Digital Spotlight on Cloud Computing, we tackle these challenges head-on, beginning with an examination of the "notorious nine"....

Download the 'How to Rethink Security' Deep Dive:

here is a pageThe bad guys are persistent, sophisticated, and they are making inroads. It is hard to be optimistic....

Download the Identity Management Deep Dive:

Identity management is no laughing matter. Yet a simple glance at today's headlines recounting innumerable hack attacks and data spills....

See all Deep Dives
©1994-2014 Infoworld, Inc.