Security - Infoworld http://www.infoworld.com/t/2094 en Fear the golden ticket attack! http://www.infoworld.com/d/security/fear-the-golden-ticket-attack-248653?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/gold_ticket_attack.jpg" alt="Fear the golden ticket attack!" width="243" height="182" align="right" /><br /><em><p align="right">Credit: Joseph Francis/Andrey Pokomeda</p></em></div> Security Access Control Authentication Hacking Identity Management Windows Security Security Tue, 19 Aug 2014 10:00:00 +0000 Roger A. Grimes 248653 at http://www.infoworld.com Google broadens its malware sleuthing to sniff out deceptive downloads http://www.infoworld.com/d/security/google-broadens-its-malware-sleuthing-sniff-out-deceptive-downloads-248432?source=rss_security <p>Google is expanding its safe browsing technology to notify Web users of downloads that appear benign, but actually make unwanted changes to their computers.</p> Security Data Loss Prevention Malware Search Engines Security Thu, 14 Aug 2014 19:42:14 +0000 admin 248432 at http://www.infoworld.com McAfee sideshow eclipses Defcon's real security breakthroughs http://www.infoworld.com/t/security/mcafee-sideshow-eclipses-defcons-real-security-breakthroughs-248136?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/john_mcafee_2.jpg" alt="McAfee sideshow eclipses Defcon's real security breakthroughs" width="243" height="182" align="right" /><br /><em><p align="right">Credit: Reuters/Jorge Dan Lopez</p> </em></div><p>John McAfee's decision to speak at last weekend's Defcon hacking conference on Friday was one of the worst-kept secrets in Las Vegas.</p> Security Cyber Crime Hacking Internet Privacy Network Security Security Mon, 11 Aug 2014 22:43:59 +0000 InfoWorld Tech Watch 248136 at http://www.infoworld.com China scrubs Apple's iPad and MacBooks from government buying list http://www.infoworld.com/d/mobile-technology/china-scrubs-apples-ipad-and-macbooks-government-buying-list-247816?source=rss_security <p>China's government, which earlier banned Windows 8 from agencies' computers, has dropped Apple's notebooks and tablets from an approved list of purchases, according to Bloomberg News today.</p> Computer Hardware Mobile Technology Security Apple Federal Regulations MacBooks Tablets Security Wed, 06 Aug 2014 19:42:09 +0000 admin 247816 at http://www.infoworld.com 5 reasons Internet crime is worse than ever http://www.infoworld.com/d/security/5-reasons-internet-crime-worse-ever-247649?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/IFW_Hacking3.jpg" alt="5 reasons Internet crime is worse than ever" width="243" height="182" align="right" /></div><p>I've been fighting Internet crime for more than 20 years. In the old days, the daily malware hot sheet was known as the Dirty Dozen -- because it listed only a dozen malware programs.</p> Security Cyber Crime Hacking Security Tue, 05 Aug 2014 10:00:00 +0000 Roger A. Grimes 247649 at http://www.infoworld.com Why you need to deploy DNSSec now http://www.infoworld.com/t/security/why-you-need-deploy-dnssec-now-247654?source=rss_security <p><em>The Domain Name System -- the distributed network of servers that reconciles the domain names in URLs and email addresses to numerical IP addresses -- is behind every successful Internet transaction. Unfortunately, due to a longstanding vulnerability, it's also behind some of the Internet's most dangerous hacks -- despite the fact that a fix, DNSSec (Domain Name System Security Extensions), has been available for years.</em></p> Networking Security Tue, 05 Aug 2014 10:00:00 +0000 New Tech Forum 247654 at http://www.infoworld.com Black Hat 2014: How to crack just about everything http://www.infoworld.com/slideshow/160625/black-hat-2014-how-crack-just-about-everything-247376?source=rss_security <!--paging_filter-->From cell phones and cars to IPv6, security researchers have turned their skills against a world of technology<div class="field field-type-text field-field-slideshow-dek"> <div class="field-label">Dek:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> From cell phones and cars to IPv6, security researchers have turned their skills against a world of technology </div> </div> </div> <div class="field field-type-text field-field-slideshow-external-source"> <div class="field-label">External Source:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> networkworld.com </div> </div> </div> <div class="field field-type-text field-field-slideshow-url-redirect"> <div class="field-label">Redirect Unpublished Slideshow to:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> http://www.networkworld.com/slideshow/160362 </div> </div> </div> Security Fri, 01 Aug 2014 10:00:00 +0000 admin 247376 at http://www.infoworld.com Mobile security: A mother lode of new tools http://www.infoworld.com/d/security/mobile-security-mother-lode-of-new-tools-247100?source=rss_security <p>Long, complex passwords that must be input on tiny screens, often while on the move: Such hassles make password-based security unworkable in a mobile world. But change is coming, thanks to an industrywide backlash that gave rise to a gold rush of new technologies.</p> <p>Eventually mobile security may no longer hinge on whether a password is long enough, but on how well the device knows the user.</p> Consumerization of IT Mobile Technology Security Mobile Security Security IDG Insider Tue, 29 Jul 2014 10:00:00 +0000 admin 247100 at http://www.infoworld.com 7 indispensable project management tips http://www.infoworld.com/d/security/7-indispensable-project-management-tips-247175?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/06FEprodwin_hp.jpg" alt="7 indispensable project management tips" width="243" height="182" align="right" /></div><p>In my role as a traveling computer security consultant, I meet with <a href="http://www.infoworld.com/t/technology-consulting/our-fault-read-the-project-audit-and-weep-245794">project managers</a> every week.</p> Security IT Management Security Tue, 29 Jul 2014 10:00:00 +0000 Roger A. Grimes 247175 at http://www.infoworld.com XML co-founder Tim Bray: Beware of spies in your software http://www.infoworld.com/t/application-development/xml-co-founder-tim-bray-beware-of-spies-in-your-software-246891?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/laptop_spy.jpg" alt="XML co-founder Tim Bray: Beware of spies in your software" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p> </em></div><p>Developers must address the serious issue of software-based threats, which leave users vulnerable to intruders, particularly governments, XML co-founder Tim Bray said Wednesday.</p> Application Development Mobile Technology Open Source Software Security Application Development Mobile Security Open Source Software Security Wed, 23 Jul 2014 20:16:01 +0000 InfoWorld Tech Watch 246891 at http://www.infoworld.com Prove it! Another security vendor claims 100 percent malware detection http://www.infoworld.com/d/security/prove-it-another-security-vendor-claims-100-percent-malware-detection-246704?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/system_attack.jpg" alt="Prove it! Another security vendor claims 100 percent malware detection" width="243" height="182" align="right" /><br /><em><p align="right">Credit: alexskopje</p></em></div> Security Anti-virus Malware Network Security Security Tue, 22 Jul 2014 10:00:00 +0000 Roger A. Grimes 246704 at http://www.infoworld.com Two glimmers of hope for enterprise security http://www.infoworld.com/t/security/two-glimmers-of-hope-enterprise-security-246622?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/Security_web_1_hp.jpg" alt="Two glimmers of hope for enterprise security" width="243" height="182" align="right" /></div><p>Enterprise security has become the breach-of-the month club. Security Authentication Endpoint Protection Network Security Patch Management Security Tools Security Mon, 21 Jul 2014 13:00:00 +0000 Eric Knorr 246622 at http://www.infoworld.com 5 big security mistakes coders make http://www.infoworld.com/t/security/5-big-security-mistakes-coders-make-246529?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/oops_error_key.jpg" alt="5 big security mistakes coders make" width="243" height="182" align="right" /><br /><em><p align="right">Credit: Gunnar Pippel</p></em></div> Application Development Security Application Development Application Security Cyber Crime Data Security Encryption Hacking Security Fri, 18 Jul 2014 10:00:00 +0000 InfoWorld Tech Watch 246529 at http://www.infoworld.com Boost your security training with gamification -- really! http://www.infoworld.com/d/security/boost-your-security-training-gamification-really-246446?source=rss_security <p>Getting employees to take security seriously when security is not their job is an old challenge that now has a new answer: Gamification.</p> <p>That's right; game-like elements can be used to enhance security awareness and modify users' behaviors. The results are tightly connected to the real world.</p> Consumerization of IT Security IT Training Consumerization of IT Security Thu, 17 Jul 2014 13:31:23 +0000 admin 246446 at http://www.infoworld.com Developing a smart approach to SMAC security http://www.infoworld.com/d/security/developing-smart-approach-smac-security-246442?source=rss_security <p>Few security executives at global enterprises -- or even at smaller organizations -- have not had to deal with issues related to social media, mobile technology, big data/analytics, or cloud computing.</p><p>Now, a growing number of businesses are looking at leveraging all of these technologies as part of a SMAC (social, mobile, analytics and cloud) platform that would involve creating a new foundational infrastructure that supports these different areas.</p> Security Security IDG Insider Thu, 17 Jul 2014 10:00:00 +0000 Pete Babb 246442 at http://www.infoworld.com Google thinks global Internet security with Project Zero http://www.infoworld.com/t/security/google-thinks-global-internet-security-project-zero-246253?source=rss_security <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/Security_web_1_hp.jpg" alt="Google thinks global Internet security with Project Zero " width="243" height="182" align="right" /></div> <p>Google is increasing its efforts in Internet security and is looking to hire security researchers for its newly formed Project Zero team.</p> Security Google Intrusion Detection Security Tue, 15 Jul 2014 17:46:27 +0000 InfoWorld Tech Watch 246253 at http://www.infoworld.com Windows admins get new tools against pass-the-hash attacks http://www.infoworld.com/d/security/windows-admins-get-new-tools-against-pass-the-hash-attacks-246198?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/password.jpg" alt="Windows admins get new tools against pass-the-hash attacks" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p></em></div> Security Encryption Hacking Windows Security Security Tue, 15 Jul 2014 10:00:00 +0000 Roger A. Grimes 246198 at http://www.infoworld.com Microsoft patches crash Dell Data Protection-Encryption and CMGShield http://www.infoworld.com/t/microsoft-windows/microsoft-patches-crash-dell-data-protection-encryption-and-cmgshield-246108?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/windows_broken_hp.jpg" alt="Microsoft patches crash Dell Data Protection-Encryption and CMGShield" width="243" height="182" align="right" /></div><p>It appears as if installing a group of patches in this month's Black Tuesday crop causes BSODs on PCs encrypted with Dell Data Protection-Encryption or forces CMGShield-protected PCs into a lockup, with a black recovery Microsoft Windows Security Microsoft Microsoft Windows Security Mon, 14 Jul 2014 12:25:49 +0000 InfoWorld Tech Watch 246108 at http://www.infoworld.com Horrifying confessions of a security sleuth http://www.infoworld.com/t/security/horrifying-confessions-of-security-sleuth-246101?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/it_secrets_hp_0.jpg" alt="Horrifying confessions of a security sleuth" width="243" height="182" align="right" /></div><p>Recently I met up with an old friend at cafe in San Francisco's Mission District, the kind where hipsters pay six bucks for an individually brewed cup of ultracaffeinated coffee. We didn't belong there -- we were too old.</p> Security Encryption Password Security Vulnerability Assessment Web Security Security Mon, 14 Jul 2014 10:00:00 +0000 Eric Knorr 246101 at http://www.infoworld.com Gmail users on iOS at risk of data interception http://www.infoworld.com/d/security/gmail-users-ios-risk-of-data-interception-246018?source=rss_security <p>Apple users accessing Gmail on mobile devices could be at risk of having their data intercepted, a mobile security company said Thursday.</p> <p>The reason is Google has not yet implemented a security technology that would prevent attackers from viewing and modifying encrypted communications exchanged with the Web giant, <a href="http://www.lacoon.com/blog/2014/07/security-disclosure-googles-ios-gmail-app-enables-threat-actor/" target="_blank">wrote</a> Avi Bashan, chief information security officer for Lacoon Mobile Security, based in Israel and the United States.</p> Mobile Technology Security iOS Security Fri, 11 Jul 2014 12:01:35 +0000 admin 246018 at http://www.infoworld.com