Security Channel

Network security news, reviews, and advice on malware defense, data security, hacker countermeasures, and security management.

Security Articles

Hillary Clinton: 'Our technology companies are not part of our government'

U.S. companies are being unfairly tarred for perceived cooperation with the government, she said

Microsoft ships replacement patch KB 2993651 with two known bugs

Microsoft re-releases botched MS14-045/KB 2982791 'Blue Screen 0x50' patch, buries tip to manually uninstall first patch, and introduces more problems

Microsoft rolls out DLP to SharePoint Online and OneDrive for Business

Office 365 already offered data loss prevention capabilities for its email tools

Netcore, Netis routers at serious risk from hardcoded passwords

More than two million of the devices on the Internet may be vulnerable to hackers monitoring their Internet traffic, Trend Micro says

Revoke certificates when you need to -- the right way

A secure Internet runs off the assurance of digital certificates. Revoking those certificates is often necessary, but problematic. Here's your best shot at doing it effectively

California passes law mandating smartphone kill switch

The law is likely to affect smartphones sold around the world

U.S. warns 'significant number' of major businesses hit by Backoff malware

Backoff malware is stealing credit card details, according to a cyber security alert

Mobile apps could be abused to make expensive phone calls

Mobile applications often don't warn users before a call is made, which a developer says could be misused

So long, iOS -- jailbreakers have found their home: Android

Jailbreakers deserve the malware infections they get, which is why they're moving to Android's 'malware is the norm' world

The UPS Store says malware found on systems of 51 stores

Names, postal, and email addresses and payment card data may have been exposed

Security White Paper

Information Security and Multi-Compliance

It’s common for information security managers to be held responsible for situations where they have little control or... more

Security Blog entry

Let your worst fears be your guide

Your computer security defense should be built with the assumption that all attackers are trusted, highly privileged insiders... more

Security White Paper

ITCi White Paper: Challenges and...

The Payment Card Industry Data Security Standard (PCI DSS) provides an enterprise structure for improving operational, security,... more

Revoke certificates when you need to -- the right way
SECURITY ADVISER
Revoke certificates when you need to -- the right way

Blog by Roger A. Grimes

A secure Internet runs off the assurance of digital certificates. Revoking those certificates is often necessary, but problematic. Here's your best shot at doing it effectively
Deep Dives
Digital Spotlight: Cloud Security:

In this Digital Spotlight on Cloud Computing, we tackle these challenges head-on, beginning with an examination of the "notorious nine"....

Download the Identity Management Deep Dive:

Identity management is no laughing matter. Yet a simple glance at today's headlines recounting innumerable hack attacks and data spills....

Download the Whitelisting Deep Dive:

Whitelisting, also known as application control, turns the problem of fighting malware on its head: Rather than attempt to block....

See all Deep Dives
©1994-2014 Infoworld, Inc.