Endpoint Protection - Infoworld http://www.infoworld.com/t/2103 en The right way to secure the Internet of things http://www.infoworld.com/d/security/the-right-way-secure-the-internet-of-things-240486?source=rss_endpoint_protection <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/connections.jpg" alt="The right way to secure the Internet of things" width="243" height="182" align="right" /><br /><em><p align="right">Credit: VLADGRIN</p> Security Authentication Endpoint Protection Security Tue, 15 Apr 2014 10:00:00 +0000 Roger A. Grimes 240486 at http://www.infoworld.com Stung by file-encrypting malware, researchers fight back http://www.infoworld.com/d/security/stung-file-encrypting-malware-researchers-fight-back-240226?source=rss_endpoint_protection <p>Jose Vildoza's 62-year-old father was using his old Windows computer when a warning in broken English flashed on the screen: your files have been encrypted.</p> <p>Vildoza's father, who speaks Spanish, didn't understand the warning, which demanded payment in order to decrypt the files. When Vildoza looked at it, he knew it was bad. And he became angry.</p> Security Cyber Crime Data Loss Prevention Encryption Endpoint Protection Malware Thu, 10 Apr 2014 11:54:58 +0000 admin 240226 at http://www.infoworld.com Microsoft to start blocking adware that lacks easy uninstall http://www.infoworld.com/d/security/microsoft-start-blocking-adware-lacks-easy-uninstall-239891?source=rss_endpoint_protection <p>Microsoft has toughened its criteria for classifying programs as adware and gave developers three months to conform with the new principles or risk having their programs blocked by the company's security products.</p> <p>The most important change in Microsoft's policy is that adware programs will be blocked by default starting July 1. In the past such programs were allowed to run until users chose one of the recommended actions offered by the company's security software.</p> Security Endpoint Protection Malware Fri, 04 Apr 2014 14:26:42 +0000 admin 239891 at http://www.infoworld.com You want to know who has access to what? Good luck http://www.infoworld.com/d/security/you-want-know-who-has-access-what-good-luck-239018?source=rss_endpoint_protection <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/lock_screen.jpg" alt="You want to know who has access to what? Good luck" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p></em></div> Security Access Control Endpoint Protection Identity Management Security Tue, 25 Mar 2014 10:00:00 +0000 Roger A. Grimes 239018 at http://www.infoworld.com A clear-eyed guide to Mac OS X's actual security risks http://www.infoworld.com/d/security/clear-eyed-guide-mac-os-xs-actual-security-risks-237060?source=rss_endpoint_protection <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/Apple_Security_hp.jpg" alt="TITLE" width="243" height="182" align="right" /></div><p>Apple's Mac computers and its OS X operating system have enjoyed a reputation of being relatively secure over the years. But in fact, experts say, the Apple OS has had security issues that might have been downplayed only because the vulnerabilities were not exploited.</p> Applications Security Apple Mac OS X Anti-virus Desktop Macs MacBooks Encryption Endpoint Protection Mon, 10 Mar 2014 11:00:00 +0000 Galen Gruman 237060 at http://www.infoworld.com Stop DNS-based DDoS attacks, once and for all http://www.infoworld.com/d/security/stop-dns-based-ddos-attacks-once-and-all-236387?source=rss_endpoint_protection <p>There's no disputing that DNS is a critical component of computer networking. However, if they fall into the wrong hands, these network tools can be abused to generate a DDoS attack -- one of the most destructive weapons on the Internet. These seemingly simple barrages have taken down big names across the Internet, and you don't want to be one of the victims.</p> Data Center Networking Security Internet Cyber Crime Endpoint Protection Hacking Data Center IDG Insider Mon, 03 Mar 2014 11:00:00 +0000 uphan 236387 at http://www.infoworld.com Researchers bypass protections in Microsoft's EMET anti-exploitation tool http://www.infoworld.com/d/security/researchers-bypass-protections-in-microsofts-emet-anti-exploitation-tool-237118?source=rss_endpoint_protection <p>Security researchers managed to bypass the protections offered by Microsoft's EMET (Enhanced Mitigation Experience Toolkit), a utility designed to detect and block software exploits, and concluded that the tool would not be effective against determined attackers.</p> Security Endpoint Protection Intrusion Detection Patch Management Vulnerability Assessment Tue, 25 Feb 2014 18:42:35 +0000 admin 237118 at http://www.infoworld.com How to rethink security for the new world of IT http://www.infoworld.com/d/security/how-rethink-security-the-new-world-of-it-236329?source=rss_endpoint_protection <p>"We shall fight on the beaches. We shall fight on the landing grounds. We shall fight in the fields and in the streets. We shall fight in the hills. We shall never surrender," said Winston Churchill in his famous June 1940 speech in the face of Nazi attacks on England. His earlier committment to the goal of victory, "however long and hard the road may be," is an apt analogy to the security battles that enterprises face.</p> Consumerization of IT Data Management Security IT Management Application Security Data Loss Prevention Data Security Endpoint Protection Hacking IDG Insider Wed, 19 Feb 2014 11:00:00 +0000 Galen Gruman 236329 at http://www.infoworld.com Target credential theft highlights third-party vendor risk http://www.infoworld.com/d/security/target-credential-theft-highlights-third-party-vendor-risk-235530?source=rss_endpoint_protection <p>Target's disclosure that credentials stolen from a vendor were used to break into its network and <a href="http://www.infoworld.com/d/security/target-now-says-70-million-affected-data-breach-233966">steal 40 million credit- and debit-card numbers</a> highlights the fact that a company's security is only as strong as the weakest link in its supply chain.</p> Security Data Security Endpoint Protection Hacking Mon, 03 Feb 2014 13:10:29 +0000 uphan 235530 at http://www.infoworld.com The processes and tools behind a true APT campaign http://www.infoworld.com/d/security/the-processes-and-tools-behind-true-apt-campaign-235095?source=rss_endpoint_protection <p>APTs are both nightmares and the stuff of legend for business leaders and security managers across the globe. In this series, CSO will examine the processes and tools used by attackers during these types of campaigns, and various mitigating factors.</p> <h3>[<a href="http://www.csoonline.com/article/734110/spear-phishing-paves-road-for-advanced-persistent-threats">Spear phishing paves road for advanced persistent threats</a>]</h3><p>&nbsp;</p> Security Data Loss Prevention Endpoint Protection Network Security Security Management IDG Insider Fri, 31 Jan 2014 11:00:00 +0000 uphan 235095 at http://www.infoworld.com Should you switch to a supersecure operating system? http://www.infoworld.com/d/security/should-you-switch-supersecure-operating-system-233561?source=rss_endpoint_protection <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/IFW_Hacking3.jpg" alt="Should you switch to a supersecure operating system?" width="243" height="182" align="right" /></div><p>A reader recently wrote me to ask how I felt about <a href="http://qubes-os.org/trac" target="_blank">Qubes</a>, an operating system conceptualized and co-created by Joanna Rutkowska, founder and CEO of Invisible Things Lab.</p> Open Source Software Security Linux Endpoint Protection Security Tools Security Tue, 07 Jan 2014 11:00:00 +0000 Roger A. Grimes 233561 at http://www.infoworld.com Safari sandboxes Flash Player to protect OS X Mavericks http://www.infoworld.com/d/security/safari-sandboxes-flash-player-protect-os-x-mavericks-229444?source=rss_endpoint_protection <p>Adobe has worked with Apple to sandbox Flash Player under Safari in OS X Mavericks, restricting the ability of attackers to exploit any vulnerabilities they might find in the browser plug-in. A sandbox is a mechanism that enforces certain restrictions on how an application interacts with the underlying operating system.</p> Applications Security Endpoint Protection Malware Web Browsers Thu, 24 Oct 2013 10:30:00 +0000 admin 229444 at http://www.infoworld.com Microsoft admits Security Essentials offers bare-bones protection by design http://www.infoworld.com/t/microsoft-windows/microsoft-admits-security-essentials-offers-barebones-protection-design-227797?source=rss_endpoint_protection <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/windows_security_hp.jpg" alt="Microsoft admits Security Essentials offers barebones protection by design" width="243" height="182" align="right" /></div><p>A Microsoft official has gone on record stating that the company's free Security Essentials software, by design, offers mere "baseline" protection for Windows PCs and users should turn to third-party offerings for Microsoft Windows Security Microsoft Microsoft Windows Anti-virus Endpoint Protection Malware Mon, 30 Sep 2013 11:53:10 +0000 InfoWorld Tech Watch 227797 at http://www.infoworld.com IE zero-day vulnerability exploited more widely than previously thought http://www.infoworld.com/d/security/ie-zero-day-vulnerability-exploited-more-widely-previously-thought-227729?source=rss_endpoint_protection <p>A recently announced and yet-to-be-patched vulnerability that affects all versions of Microsoft Internet Explorer (IE) has been exploited in targeted attacks against organizations in Taiwan since the beginning of July, according to security researchers.</p> Applications Security Internet Explorer (IE) Microsoft Anti-spyware Endpoint Protection Intrusion Detection Malware Patch Management Web Browsers Vulnerability Assessment Fri, 27 Sep 2013 16:11:12 +0000 admin 227729 at http://www.infoworld.com How to secure your company against NSA-inspired hacking http://www.infoworld.com/t/data-security/how-secure-your-company-against-nsa-inspired-hacking-226264?source=rss_endpoint_protection <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/snowden_screen.jpg" alt="How to secure your company against NSA-inspired hacking" width="243" height="182" align="right" /><br /><em><p align="right">Credit: Reuters/Jason Lee</p> Security Data Security Encryption Endpoint Protection Hacking Fri, 06 Sep 2013 11:40:11 +0000 InfoWorld Tech Watch 226264 at http://www.infoworld.com IBM to acquire endpoint security company Trusteer http://www.infoworld.com/d/the-industry-standard/ibm-acquire-endpoint-security-company-trusteer-224984?source=rss_endpoint_protection <p>IBM has signed an agreement to acquire security company Trusteer, and plans to set up a cyber security software lab in Israel.</p> <p>The financial terms of the proposed acquisition were not disclosed. With offices in Boston and Tel Aviv, Trusteer is a provider of endpoint cyber crime prevention technology and services, with customers among the top banks in the U.S., Canada, and Australia.</p> Security The Industry Standard IBM M&A Cyber Crime Endpoint Protection Thu, 15 Aug 2013 12:43:05 +0000 admin 224984 at http://www.infoworld.com Researchers demo exploits that bypass Windows 8 Secure Boot http://www.infoworld.com/d/security/researchers-demo-exploits-bypass-windows-8-secure-boot-223980?source=rss_endpoint_protection <p>The Windows 8 Secure Boot mechanism can be bypassed on PCs from certain manufacturers because of oversights in how those vendors implemented the Unified Extensible Firmware Interface (UEFI) specification, according to a team of security researchers.</p> <p>The researchers Andrew Furtak, Oleksandr Bazhaniuk and Yuriy Bulygin demonstrated Wednesday at the Black Hat USA security conference in Las Vegas two attacks that bypassed Secure Boot in order to install a UEFI bootkit -- boot rootkit -- on affected computers.</p> Microsoft Windows Security Windows 8 Endpoint Protection Malware Vulnerability Assessment Fri, 02 Aug 2013 12:00:19 +0000 admin 223980 at http://www.infoworld.com Most enterprise networks riddled with vulnerable Java installations, report says http://www.infoworld.com/d/security/most-enterprise-networks-riddled-vulnerable-java-installations-report-says-222983?source=rss_endpoint_protection <p>Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organizations because most of them have outdated versions of the software installed on their systems, according to a report by security firm Bit9.</p> <p>Bit9's report was released Thursday and is based on data about Java usage collected from approximately 1 million enterprise endpoint systems owned by almost 400 organizations that use the company's software reputation service.</p> Application Development Security Endpoint Protection Malware Patch Management Thu, 18 Jul 2013 12:24:39 +0000 admin 222983 at http://www.infoworld.com The one security technology that actually works http://www.infoworld.com/d/security/the-one-security-technology-actually-works-222763?source=rss_endpoint_protection <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/security_checkmarks_hp.jpg" alt="The one security technology that actually works" width="243" height="182" align="right" /></div><p>To decrease security risk, most companies try to do too much. They have dozens of "top priority" security projects, few of which they ever complete and even fewer that are done well.</p> Security Endpoint Protection Security Management Security Tools Security Tue, 16 Jul 2013 10:00:00 +0000 Roger A. Grimes 222763 at http://www.infoworld.com Another Windows tablet falls short of the iPad http://www.infoworld.com/d/consumerization-of-it/another-windows-tablet-falls-short-of-the-ipad-221836?source=rss_endpoint_protection <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/windows_broken_hp.jpg" alt="Another Windows tablet falls short of the iPad" width="243" height="182" align="right" /></div><p>Even though businesspeople love iPads, IT loves Windows, so it keeps hoping Microsoft and its hardware partners will finally deliver a Windows tablet that makes users forget the iPad.</p> Computer Hardware Consumerization of IT Microsoft Windows Mobile Technology Security Windows 8 Microsoft Windows iPad Encryption Endpoint Protection Tablets Tue, 02 Jul 2013 10:00:00 +0000 Galen Gruman 221836 at http://www.infoworld.com