Free Newsletters :

'Security' Tag Index

Apple Sounds Off on PRISM
By Pedro Hernandez | Article Published June 17, 2013
The U.S. government does not have direct access to its systems, claims the tech giant.
Tags: NSA, security, priSM
Adobe Patches Flash--Again
By Cynthia Harvey | Article Published February 27, 2013
For the third time in a month, the company has released an emergency security update.
Tags: Flash, Adobe, security, vulnerability, update
Industrial Hacking Isn’t Just Made In China
By Mike Elgan | Article Published February 20, 2013
Suddenly, everybody's doing it. And if Google executive Eric Schmidt is right, honest companies don't stand a chance.
Tags: security, hacking, Twitter
Mobile Malware Driven by Porn
By Sean Michael Kerner | Article Published February 11, 2013
Mobile users are using their smartphones and tablets for more than 'legitimate' work purposes. Who knew?
Tags: malware, security, mobile
Researchers Uncover Massive Cyber-Spying Campaign
By Cynthia Harvey | Article Published January 14, 2013
Kaspersky Lab says "Operation Red October" has been going on since 2007.
Tags: malware, cyber attack, Iran, United States, espionage, security, cyberspying, Russia
Sophos Tackles BYOD Security and MDM with EndUser Protection
By Pedro Hernandez | Article Published January 08, 2013
The security software maker shifts to a per-user approach for MDM.
Tags: mobile, BYOD, security, MDM
How to Create a Bulletproof Ubuntu Installation
By Matt Hartley | Article Published January 02, 2013
Tips on setting up a Ubuntu install you don't have to worry about it.
Tags: Linux, security, Ubuntu
Protecting Your Ubuntu Desktop
By Matt Hartley | Article Published October 22, 2012
A quick guide to security on your Ubuntu Linux desktop.
Tags: Linux, security, Ubuntu
Execs Remain Confident on Security While All Is Not Well, Survey Shows
By Staff | Article Published September 20, 2012
Most IT security chiefs think their practices and procedures are sufficient.
Tags: survey, security
New In-the-Wild Malware Linked to State-Sponsored Flame Targeting Iran
By Staff | Article Published September 17, 2012
Security researchers discover more details about the Flame malware, including the names of some of its creators.
Tags: research, malware, Flame, security
FBI Denies It Was Source of Leaked Apple Device ID Data
By Staff | Article Published September 05, 2012
Experts think the data AntiSec posted may have come from an app developer.
Tags: hack attacks, hacktivism, security, hackers, FBI
Malware Increases 23%: Report
By Staff | Article Published September 04, 2012
McAfee says that hackers are increasingly targeting Macs and Android smartphones in addition to PCs.
Tags: botnets, mobile, text messaging, security, malware, Mac, smartphones, spam, McAfee
Hackers Leak 1 Million Apple Device IDs
By Staff | Article Published September 04, 2012
AntiSec claims they got the personal data from an FBI agent's laptop.
Tags: hackers, Apple, security, FBI, hack attacks, hacktivism
Oracle Releases Emergency Java Patch to Block Zero-Day Exploits
By Staff | Article Published August 31, 2012
Security researchers confirm that the update addresses the vulnerability exploited by two attacks identified earlier this week.
Tags: security, Zero-Day exploit, hack attacks, patch, Oracle, Java, update
Unpatched Java flaw Hit in Targeted Attacks, Researchers Say
By Staff | Article Published August 28, 2012
The zero-day vulnerability affects the most recent version of Java.
Tags: malware, Java, Zero-Day exploit, security, vulnerability, trojan
IBM Launches New zEnterprise EC12 Secure Cloud-Focused Mainframe System
By Staff | Article Published August 28, 2012
Big Blue says this is its most powerful mainframe ever.
Tags: Memory, IBM, analytics, security, mainframe, solid state
Crisis Financial Malware Spreads Via Virtual Machines
By Staff | Article Published August 21, 2012
Security experts say this is the first known malware that attempts to propagate by virtual machines.
Tags: virtual machine, security, malware, Java
Mystery Malware Wreaks Havoc on Energy Sector Computers
By Staff | Article Published August 17, 2012
Shamoon worm destroys data on energy firms' PCS.
Tags: cyberattack, security, worm, Shamoon, malware
Oracle Patches Database Security Flaw Disclosed at Black Hat
By Staff | Article Published August 14, 2012
The company encourages end users to apply the security update as soon as possible.
Tags: database, bug, update, Black Hat Conference, security, Oracle, vulnerability
Researchers Discover More Malware Related to Flame, Stuxnet
By Staff | Article Published August 10, 2012
The Gauss malware is spying on Lebanese banking data.
Tags: malware, virus, Stuxnet, Flame, Kaspersky Labs, Gauss, security
Survey: About Half of Organizations Use Cloud-Based Services for Sensitive Data
By Staff | Article Published August 07, 2012
Another third of enterprises surveyed said they planned to start storing sensitive data in the cloud during the next two years.
Tags: survey, public cloud, cloud computing, security
Apple Allowed Hacker Access to User's iCloud Account
By Staff | Article Published August 06, 2012
A social engineering ploy allowed a hacker to wipe a journalist's iPhone, iPad and MacBook, as well as to gain access to his Gmail and Twitter accounts.
Tags: Apple, MacBook, hacker, Gmail, iPad, iPhone, iCloud, cloud computing, hack attacks, security
Google Wants Chrome 21 to See You
By Sean Michael Kerner | Article Published August 01, 2012
New APIs extend the utility of the browser for webcams and gamepads.
Tags: Google, browser, Chrome, security
Dropbox Admits Hack, Adds More Security Features
By Staff | Article Published August 01, 2012
An employee re-used a corporate password on other Web services, ultimately allowing a hacker to gain access to customer email addresses.
Tags: email, hack, hack attacks, security, spam, password, DropBox
Mobile Malware Cases Nearly Triple in First Half of 2012, Says NetQin
By Staff | Article Published July 31, 2012
A Chinese security vendor says 13 million phones were infected in the first six months of the year.
Tags: mobile, China, malware, Symbian, security, Android
Apple to Buy Fingerprint Sensor Maker AuthenTec for $356 Million
By Staff | Article Published July 27, 2012
AuthenTec currently licenses its technology to Samsung, one of Apple's chief competitors.
Tags: merger and acquistion activity, software, security, near-field communication, Apple, Samsung
Spam, Malware, Virus Outbreaks Rise in 2012: Report
By Staff | Article Published July 26, 2012
E-mail is more dangerous than ever.
Tags: phishing, virus, malware, spam, e-Mail, security
Hacking Experts Find New Ways to Attack Android Phones
By Staff | Article Published July 26, 2012
A researcher shows off an NFC-based attack at the Black Hat conference.
Tags: security, near-field communications, Black Hat Conference, hacking, Android, Google, NFC
Report Suggests Malware Hits Iran Atomic Organization, Blasts AC/DC at Night
By Staff | Article Published July 24, 2012
An F-Secure researcher received an e-mail from Iran which claims the country's atomic organization was the victim of malware that plays heavy metal.
Tags: malware, Stuxnet, Iran, security
Phishing Websites Reach All-Time High
By Staff | Article Published July 20, 2012
Security researchers found 56,859 fake websites for their latest report.
Tags: security, phishing
Researchers Say They Took Down World's Third-Largest Botnet
By Staff | Article Published July 19, 2012
The Grum botnet was responsible for 18 percent of the world's spam.
Tags: malware, spam, botnet, security
Oracle to Release 88 Security Fixes Next Week
By Staff | Article Published July 13, 2012
The patches will address vulnerabilities in Oracle databases, Fusion Middleware, MySQL, Siebel CRM, PeopleSoft and other applications.
Tags: Solaris, bugs, MySQL, database, Oracle, security, Siebel CRM, Glassfish, Fusion Middleware, patch, vulnerabilities
Windows, Linux, Mac OS X Hit by Cross-Platform Malware Attack
By Staff | Article Published July 12, 2012
The Trojan first checks to see which OS a machine is running, then downloads the appropriate file.
Tags: OS X, malware, Trojans, Windows, security, cross-platform, Linux
Yahoo Passwords Hacked, Likely Taken Through Yahoo Voices
By Staff | Article Published July 12, 2012
Hackers from D33D Company posted usernames and passwords for 435,000 Yahoo accounts.
Tags: hackers, Yahoo, hacking, password, security
Microsoft Squashes Zero-Day Bug in July Patch Tuesday
By Staff | Article Published July 11, 2012
This month's security update addresses vulnerabilities in Windows, Internet Explorer, Visual Basic for Applications and Microsoft Office.
Tags: Windows, security, Patch Tuesday, vulnerability, Visual Basic, Microsoft, Office, Internet Explorer
FBI Net Shut Off Has 'Limited' Impact on Victims
By Staff | Article Published July 09, 2012
The DNS Changer malware is affecting 69,517 systems in the U.S., many of them not heavily used.
Tags: DNS Changer, malware, security, FBI, virus
Security Researchers Backtrack on Android Malware Claim
By Staff | Article Published July 06, 2012
A Microsoft researcher admits he might not have found an Android botnet after all.
Tags: Microsoft, botnet, Android, spam, malware, security
First Apple App Store Malware Found by Kaspersky
By Staff | Article Published July 06, 2012
The Find and Call app stole contact data and uploaded it to a remote server.
Tags: security, malware, app store, trojan, Apple
Intel Buys IDesia Biometrics to ID Heartbeats
By Pedro Hernandez | Article Published July 05, 2012
Intel buys a star-tup that uses a novel approach to identify users. But where does it fit into the chipmaker's plans?
Tags: mobile, acquisition, Intel, biometrics, security
Android Smartphones 'Used For Botnet', Researchers Say
By Staff | Article Published July 05, 2012
A Microsoft researcher says Android phones are being used to send spam through Yahoo mail servers.
Tags: Android, spam, botnet, security, Microsoft, smartphone
Ubuntu Security: Is There a Threat?
By Matt Hartley | Article Published July 02, 2012
Tips on protecting Ubuntu and the Linux desktop.
Tags: Ubuntu, malware, security
Thousands of Office Printers Hit by 'Gibberish' Malware
By Staff | Article Published June 22, 2012
It's a “paper salesman’s dream come true.”
Tags: printers, security, trojan, malware
Talking About Security Bores the Boss, Survey Shows
By Staff | Article Published June 13, 2012
Only 15 percent of CEOs are "very concerned" about IT security.
Tags: security, survey
AMD Adds ARM Processor as It Looks Beyond x86
By Staff | Article Published June 13, 2012
The Intel competitor says it is interested in TrustZone security technology.
Tags: security, smartphone, ARM, PC, tablet, processor, AMD, x86
Researchers Connect Flame to U.S.-Israel Stuxnet Attack
By Staff | Article Published June 11, 2012
One Flame module is nearly identical to a Stuxnet module.
Tags: Flame, security, Stuxnet, cyberattack, malware
LinkedIn Investigating Reports That 6.46 Million Hashed Passwords Have Leaked Online
By Staff | Article Published June 06, 2012
Experts recommend changing your password, just to be safe.
Tags: security, hack attacks, passwords, LinkedIn
Google Apps Achieves ISO 27001 Security Certification
By Staff | Article Published May 30, 2012
The company compares its cloud computing service to "a bank for your data."
Tags: cloud computing, security, Google Apps
Gartner: 60 Percent of Firms Plan Increase in Staff Social Media Snooping by 2015
By Staff | Article Published May 29, 2012
More companies plan to monitor Facebook, Twitter, YouTube, and LinkedIn for security reasons.
Tags: Surveillance, social media, security
Meet 'Flame,' the Massive Spy Malware Infiltrating Iranian Computers
By Staff | Article Published May 29, 2012
Found throughout the Middle East and North Africa, the malware appears to be part of a state-run cyber-espionage campaign.
Tags: security, Stuxnet, spyware, cyberwar, espionage, malware, Flame, Duqu
McAfee Reports Big Spike in Malware
By Staff | Article Published May 24, 2012
The security vendor says it was the "busiest quarter in recent history" for malware.
Tags: security, malware, report, McAfee
Attackers Hit Human Rights, Foreign Policy Websites With Drive-By Exploits
By Staff | Article Published May 17, 2012
These latest cyberattacks are more strategic and targeted than previous attacks.
Tags: security, website, hackers, cyberattack
Symantec Revenues Flat As License Sales Drop
By Sean Michael Kerner | Article Published May 03, 2012
The move to the cloud means more companies are buying subscriptions.
Tags: security, Symantec, Cloud
Mystery Group Hacks U.S. Military, Harvard, NASA, More
By Staff | Article Published May 03, 2012
The Unknowns warn websites to patch their security vulnerabilities.
Tags: hack attacks, security
Android Mobile Attack: Hacked Websites Target Android Users
By Staff | Article Published May 03, 2012
Security researchers are warning about NotCompatible malware, which is being used in the first ever drive-by attack aimed at Android.
Tags: security, Android, mobile, malware
Will BYOD Get You Fired?
By Jeff Vance | Article Published May 01, 2012
The hidden Bring Your Own Device traps that could cost IT pros their jobs.
Tags: BYOD, mobile, bring your own device, security
CISPA Cyber-Threat Bill Passes House Despite Worries Over Privacy
By Staff | Article Published April 27, 2012
The bill now heads to the Senate, but President Obama has threatened to veto the bill if it passes Congress.
Tags: privacy, CISPA, security, government, Congress
VMware Source Code Stolen, Impact Unclear
By Staff | Article Published April 26, 2012
Hackers have posted the VMware ESX source code online.
Tags: VMware, security, source code, virtualization, hackers
Kaspersky Claims Apple is '10 Years Behind Microsoft' on Security
By Staff | Article Published April 26, 2012
Security firm predicts that Mac users will experience a lot more attacks like the Flashback Trojan.
Tags: malware, security, Mac, Apple, Kaspersky Labs
Mobile Endpoint Security: Buying Guide
By Jeff Vance | Article Published April 23, 2012
Selecting the best mobile endpoint security solution depends on which BOYD model you use, cost, and method of protecting sensitive data.
Tags: mobile endpoint security, endpoint security, buyer guide, mobile, security
Anonymous Drives Security Fears, But Not Spending
By Staff | Article Published April 23, 2012
A survey finds 61 percent of IT personnel believe hacktivists are likely to target their networks in the next six months.
Tags: advanced persistent threats, Anonymous, security, hacktivism
Privacy Advocates vs. The Government: Why CISPA Will Become Law
By Mike Elgan | Article Published April 18, 2012
Public outcry defeated proposed SOPA legislation, yet key support will likely push through an altered form of cybersecurity legislation.
Tags: security, cyber security, CISPA, SOPA
Website Vulnerabilities Fall, But Hackers Become More Skilled
By Staff | Article Published April 17, 2012
A survey finds that the average website has 148 security vulnerabilities.
Tags: security, vulnerabilities, hackers, website
Oracle to Issue 88 Security Patches on Tuesday
By Staff | Article Published April 13, 2012
The huge release addresses vulnerabilities in many of the company's enterprise software products.
Tags: security, Oracle, software, Enterprise, vulnerability
DDOS Attacks on Financial Services Firms Explode
By Staff | Article Published April 12, 2012
Most of the attacks originate in China.
Tags: China, DDOS Attack, security
Apple Works on Malware Detection, Removal Tool
By Staff | Article Published April 11, 2012
The company hopes to help its users who have become victims of the Flashback malware.
Tags: Apple, security, malware, Flashback
How to Stop Cops from Abusing Technology
By Mike Elgan | Article Published April 04, 2012
Law enforcement officials use surveillance technologies that citizens are prohibited from using -- a situation that raises serious questions.
Tags: security, Surveillance, privacy
Chinese Cyberspying Efforts Linked to Former Graduate Student
By Staff | Article Published March 30, 2012
Gu Kaiyuan is linked to persistent hack attacks against Japanese and Indian companies and Tibetan activists.
Tags: China, security, hack attacks, cyberspying
U.S. Outgunned in Hacker War
By Staff | Article Published March 29, 2012
An outgoing FBI official said, "We're not winning" the cyberwar.
Tags: hackers, security, FBI
China Stealing 'Great Deal' of U.S. Military Secrets
By  | Article Published March 28, 2012
The NSA head also said that China was behind the 2011 attacks on RSA.
Tags: China, hack attacks, military, security, RSA
Symantec Dissolves a Chinese Alliance
By Staff | Article Published March 27, 2012
The U.S. security firm worried that working with a Chinese firm would prevent it from obtaining classified information about cyberthreats.
Tags: Symantec, China, security
Microsoft Claims to Take Down Zeus
By Staff | Article Published March 26, 2012
The software giant helped law enforcement seize servers controlling the notorious botnet.
Tags: malware, hacker, botnet, Zeus, security, Microsoft
63% of Website Owners Don't Know How They Were Hacked
By Staff | Article Published March 22, 2012
Ninety percent of website owners didn't even notice the hack.
Tags: hack attacks, security
Hacktivism Was the Leading Cause for Compromised Data in 2011, Says Verizon
By Staff | Article Published March 22, 2012
Report finds external threats caused 98 percent of data breaches.
Tags: security, data breaches, hacktivism
Beware: Ads in Mobile Apps Fraught With Security Risk
By Staff | Article Published March 20, 2012
Nearly half of all ad-supported Android apps tracked users' locations, and a few downloaded and ran code from the Internet.
Tags: Ads, Google Play, mobile, apps, security, Android
Cloud-Based Disaster Recovery Tools
By Jeff Vance | Article Published March 19, 2012
Is protecting your data with a disaster recovery solution accessed over the cloud a good choice for your enterprise?
Tags: security, DR planning, disaster recovery, cloud computing