Cyberwarfare

Cyberwarfare news, trends, analysis and practical advice

Retired US airport body scanners fail to spot guns, knives

A type of body scanner in wide use across U.S. airports through last year fails to spot well-concealed weapons including guns and knives, computer security researchers contend.

chrome browser logo

Symantec folds nine Norton products into one service

Symantec will consolidate its cluttered Norton line of security software, folding nine products into one online service that can be used across desktop computers and mobile devices.

Chinese man indicted over theft of Boeing C-17 secrets

A Chinese man has been indicted for allegedly directing two China-based hackers to infiltrate Boeing and other defense contractors to steal gigabytes of documents describing U.S. military aircraft.

Heartbleed software flaw exposes weaknesses in hardware design

Heartbleed may have been a software bug, but it highlighted glaring weaknesses in existing hardware architectures, which remain vulnerable to memory-bound attacks, a university researcher said this week.

NSA can start Judgment Day! The Skynet is falling!!

MonsterMind: Hard to terminate. Another day, another scary thing we learn about the NSA. In a recent interview, whistleblower Edward Snowden tells us to fuhgeddaboudit when the NSA gets its wires crossed. According to Snowden,...

4 Small Business Security Lessons From Real-Life Hacks

It's no longer unusual to see major, massive hacks make news these days. They affect millions of individuals and cost millions of dollars to rectify.

Users told to patch critical flaw in Adobe Reader and Acrobat

Adobe Systems has released security patches for its Flash Player, Reader and Acrobat products, addressing a total of eight vulnerabilities, including one that is being exploited by attackers.

15 new vulnerabilities reported during router hacking contest

Routers appear to be as insecure as ever, after hackers successfully compromised five popular wireless models during a contest at the DefCon 22 security conference, reporting 15 new vulnerabilities to affected vendors.

Study finds firmware plagued by poor encryption and backdoors

The first large-scale analysis of a fundamental type of software known as firmware has revealed poor security practices that could present opportunities for hackers probing the "Internet of Things."

IBM focuses on identity management with Lighthouse buy

IBM has purchased Lighthouse Security Group and plans to combine it with another recent acquisition to build a set of identity management software and services.

Mobile chips face lockdown to prevent hacks

Chip makers want to make hardware the first layer of defense against data breaches and other attacks on tablets and smartphones.

Home routers supplied by ISPs can be compromised en masse

Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn.

Does your business need a "Data Protection Officer?"

New data-privacy regulation for the European Union expected to gain approval as early as October of this year would break new ground by requiring businesses selling goods and services to European citizens to appoint a so-called "Data...

Emerging networking tech used by Apple, Cisco frustrates firewalls

Today's security software is ineffective against an emerging networking technology already in use by Apple for its Siri voice-recognition software, according to research presented at the Black Hat hacking conference this week.

Oracle issues a virtual strongbox for enterprise encryption keys

Managing the keys of all your valuable resources, be they in the real world or the virtual, can be a hassle. Managing all the encryption keys for an entire enterprise is a harder challenge still.

these chinese government bans apple product claims

Chinese government bans Apple, really?

The situation for US tech firms in China has certainly become more difficult as a result of US surveillance activities.

Cisco: Blackhole arrest cuts exploit-kit traffic, but don't let your guard down

Exploit kits of cybercrime tools fell into a big slump in the first half of this year after Russian authorities nabbed the alleged creator of the popular Blackhole kit, but users aren't necessarily safer.

Is your Dropcam feed being watched by someone else?

Dropcam, the popular video monitoring camera, bills itself as "super simple security." But a pair of researchers plan to show at the Defcon hacking conference later this week how having a Dropcam could get a lot more complicated.

IBM buys access control and identity management firm CrossIdeas

IBM has added to its security software portfolio with the purchase of Italian access control and identity management firm CrossIdeas for an undisclosed sum, the companies said Thursday.

Load More