Security Channel

Network security news, reviews, and advice on malware defense, data security, hacker countermeasures, and security management.

Security Articles

Here's how to stay safe until the Tails privacy tool is patched

Patches are ready for IP2, the vulnerable component in Tails, but it's not clear when the operating system will be updated

Cyber criminals ride Google coattails in DDoS attacks

Cyber criminals are able to launch distributed denial-of-service attacks against websites by pretending to be Google Web crawlers

Surface Pro 3 problems linger despite three firmware patches in a month

Slow/dropped Wi-Fi, heating issues, and lockups persist, but Surface Pro pro's manual driver installation procedure may help

Another botched Microsoft patch: Office 365 ProPlus says 'Something went wrong'

Microsoft took 12 days to fix a bug that locked out some Office 365 ProPlus customers after a silent patch automatically installed

New guide aims to remove the drama of reporting software flaws

Bugcrowd worked with legal firm CipherLaw to develop a framework for setting up a responsible bug disclosure program

'Canvas fingerprinting' tracking method is sneaky but easy to halt

At least two browser extensions can stop the new method for tracking Internet users, which was in wide use earlier this year

Internet Explorer vulnerabilities surge to record levels in 2014

IE suffered more than twice as many vulnerabilities as Chrome and Firefox, an analysis of National Vulnerability Database figures shows

11 signs you've been hacked -- and how to fight back

Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned

Thousands of sites compromised through WordPress plug-in vulnerability

Hackers are actively exploiting a vulnerability found recently in the MailPoet Newsletters plug-in for WordPress

Firm says vulnerability in Tails contained in I2P component

The flaw, one of several in the privacy-focused operating system, is demonstrated in a video by vulnerability broker Exodus Intelligence

Security White Paper

Information Security and Multi-Compliance

It’s common for information security managers to be held responsible for situations where they have little control or... more

Security Blog entry

Let your worst fears be your guide

Your computer security defense should be built with the assumption that all attackers are trusted, highly privileged insiders... more

Security White Paper

ITCi White Paper: Challenges and...

The Payment Card Industry Data Security Standard (PCI DSS) provides an enterprise structure for improving operational, security,... more

Prove it! Another security vendor claims 100 percent malware detection
Prove it! Another security vendor claims 100 percent malware detection

Blog by Roger A. Grimes

A long line of security vendors has promised to detect all malware. Every last one failed. Can Trustwave break the mold?
Deep Dives
Digital Spotlight: Cloud Security:

In this Digital Spotlight on Cloud Computing, we tackle these challenges head-on, beginning with an examination of the "notorious nine"....

Download the 'How to Rethink Security' Deep Dive:

here is a pageThe bad guys are persistent, sophisticated, and they are making inroads. It is hard to be optimistic....

Download the Identity Management Deep Dive:

Identity management is no laughing matter. Yet a simple glance at today's headlines recounting innumerable hack attacks and data spills....

See all Deep Dives
©1994-2014 Infoworld, Inc.