Security Channel

Network security news, reviews, and advice on malware defense, data security, hacker countermeasures, and security management.

Security Articles

Microsoft EMET 5.0 security tool puts a leash on plug-ins

Latest version of the free toolkit allows administrators to block third-party plug-ins -- a favored route for attackers

Most USB thumb drives can be reprogrammed to infect computers

The firmware in such devices is unprotected and can be easily overwritten by malware, researchers from Security Research Labs said

Judge rules against Microsoft in email privacy case

The company is compelled to comply with a U.S. warrant for emails held on a server in Ireland, a judge rules

IBM buys access control and identity management firm CrossIdeas

With CrossIdeas, IBM is gaining auditing tools for policing segregation-of-duties violations across disparate systems

No patch yet for zero day in Symantec Endpoint Protection software driver

Symantec has published recommendations for mitigating the danger

Many antivirus products are riddled with security flaws

Antivirus products increase a computer's attack surface and may even lower an operating system's protections, a security researcher claims

iPhone gets first free app for encrypting voice calls

Open-source Signal app is compatible with RedPhone, its Android sibling

3 zero-day flaws found in Symantec's Endpoint Protection

Security vendor Offensive Security says the flaws could be used to gain full system access

Mobile management: Making sense of your options

There are known, proven approaches to reduce mobile security risks without disabling the benefit of consumerization

BlackBerry adds more security for the sensitive enterprise

BlackBerry says it can offer levels of security that can not be replicated on Apple, Android or other mobile devices

Security White Paper

Information Security and Multi-Compliance

It’s common for information security managers to be held responsible for situations where they have little control or... more

Security Blog entry

Let your worst fears be your guide

Your computer security defense should be built with the assumption that all attackers are trusted, highly privileged insiders... more

Security White Paper

ITCi White Paper: Challenges and...

The Payment Card Industry Data Security Standard (PCI DSS) provides an enterprise structure for improving operational, security,... more

7 indispensable project management tips
SECURITY ADVISER
7 indispensable project management tips

Blog by Roger A. Grimes

Good project managers are worth their weight in gold -- and earn their keep by following these best practices
Deep Dives
Digital Spotlight: Cloud Security:

In this Digital Spotlight on Cloud Computing, we tackle these challenges head-on, beginning with an examination of the "notorious nine"....

Download the 'How to Rethink Security' Deep Dive:

here is a pageThe bad guys are persistent, sophisticated, and they are making inroads. It is hard to be optimistic....

Download the Identity Management Deep Dive:

Identity management is no laughing matter. Yet a simple glance at today's headlines recounting innumerable hack attacks and data spills....

See all Deep Dives
©1994-2014 Infoworld, Inc.