Security Channel

Network security news, reviews, and advice on malware defense, data security, hacker countermeasures, and security management.

Security Articles

New guide aims to remove the drama of reporting software flaws

Bugcrowd worked with legal firm CipherLaw to develop a framework for setting up a responsible bug disclosure program

'Canvas fingerprinting' tracking method is sneaky but easy to halt

At least two browser extensions can stop the new method for tracking Internet users, which was in wide use earlier this year

Internet Explorer vulnerabilities surge to record levels in 2014

IE suffered more than twice as many vulnerabilities as Chrome and Firefox, an analysis of National Vulnerability Database figures shows

11 signs you've been hacked -- and how to fight back

Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned

Thousands of sites compromised through WordPress plug-in vulnerability

Hackers are actively exploiting a vulnerability found recently in the MailPoet Newsletters plug-in for WordPress

Firm says vulnerability in Tails contained in I2P component

The flaw, one of several in the privacy-focused operating system, is demonstrated in a video by vulnerability broker Exodus Intelligence

XML co-founder Tim Bray: Beware of spies in your software

Governments are a key offender, he stresses, advising use of HTTPS and OpenPGP to block software-based security threats

Zero-day flaws in Tails aren't for sale, vulnerability broker says

Exodus Intelligence will provide a report to the developer of the privacy-focused OS by the end of the week, a company exec said

Virtru launches business email encryption service for Google Apps

The service, which allows for fine administrator control of messaging, is free to try through later this year

Black Hat presentation on Tor suddenly cancelled

The presentation revolved around a low-budget method to de-anonymize users of the privacy tool

Security White Paper

Information Security and Multi-Compliance

It’s common for information security managers to be held responsible for situations where they have little control or... more

Security Blog entry

Let your worst fears be your guide

Your computer security defense should be built with the assumption that all attackers are trusted, highly privileged insiders... more

Security White Paper

ITCi White Paper: Challenges and...

The Payment Card Industry Data Security Standard (PCI DSS) provides an enterprise structure for improving operational, security,... more

Prove it! Another security vendor claims 100 percent malware detection
SECURITY ADVISER
Prove it! Another security vendor claims 100 percent malware detection

Blog by Roger A. Grimes

A long line of security vendors has promised to detect all malware. Every last one failed. Can Trustwave break the mold?
Deep Dives
Digital Spotlight: Cloud Security:

In this Digital Spotlight on Cloud Computing, we tackle these challenges head-on, beginning with an examination of the "notorious nine"....

Download the 'How to Rethink Security' Deep Dive:

here is a pageThe bad guys are persistent, sophisticated, and they are making inroads. It is hard to be optimistic....

Download the Identity Management Deep Dive:

Identity management is no laughing matter. Yet a simple glance at today's headlines recounting innumerable hack attacks and data spills....

See all Deep Dives
©1994-2014 Infoworld, Inc.