Endpoint Security

Endpoint Security coverage at Computerworld

spam 000005468488
How to use a smart chip card

Internet cyber security

Web app attacks, PoS intrusions and cyberespionage top causes of data breaches

Web application attacks, point-of-sale intrusions, cyberespionage and crimeware were the leading causes of confirmed data breaches last year.


Yahoo puts email encryption plugin source code up for review

Yahoo released the source code for a plugin that will enable end-to-end encryption of email messages, a planned data-security improvement prompted by disclosures of U.S. National Security Agency snooping.


Five sneaky ways companies are changing employees’ security behavior

Like precocious teenagers, some employees don’t want to be told what to do when it comes to cyber security. Too many rules about what they can and cannot do with technology can lead to bad decisions that inadvertently put company data...

Free and cheap ways to learn about IT security

Free and cheap ways to learn about IT security

From recovering deleted files to setting up an intrusion detection system, these seven projects give you hands-on experience with an array of security tasks.


Link between NSA and Regin cyberespionage malware becomes clearer

Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for...

internet security with lock

6 DNS services protect against malware and other unwanted content

A good DNS service can protect users from a variety of unwanted Web intruders, including phishing sites and botnets. We look at six of them.


Thunderbolt devices can infect MacBooks with persistent rootkits

The rogue code will run in the boot ROM and will be hard to detect or remove, a researcher said.


Iranian hackers compromised airlines, airports, critical infrastructure firms

For the past two years, a team of Iranian hackers has compromised computers and networks belonging to more than 50 organizations from 16 countries, including airlines, defense contractors, universities, military installations, and...

Wikimedia (CC)

Russians easily 'hack' webcams, like others have for YEARS

Webcam hacking is in the news -- and it's bad stuff. But...haven't people been circumventing webcam security using default passwords for years now? How too could anyone forget, recent news about the NSA hacking webcams?

Business system of technology devices and functions

Startup Outlier grabs endpoint forensic data without agent software

Outlier, a startup with a sound pedigree in network security, is launching an endpoint threat-detection system that sets itself apart from competitors by working without the need for an agent on every machine.

Hacker manipulating code

Hackers make drive-by attacks stealthier with fileless infections

Cybercriminals are increasingly infecting computers with malware that resides only in memory in order to make their attacks harder to detect.

computer hacker aa006208

Rigged industrial software site points to watering hole attack

Attackers have rigged the website of an industrial software firm with a sophisticated reconnaissance tool, possibly in preparation for attacks against companies from several industries.

New malvertising campaign hit visitors of several high-profile sites

Attackers redirected users to Web-based exploits by pushing malicious advertisements onto popular sites, researchers from Fox-IT said

Hackers prey on Russian patriotism to grow the Kelihos botnet

A recent spam campaign encouraged Russian speakers to install malware on their computers to participate in DDoS attacks, researchers said

US warns 'significant number' of major businesses hit by Backoff malware

More than 1,000 major enterprise networks and small and medium businesses in the U.S. have been compromised by a recently discovered malware package called "Backoff" and are probably unaware of it, the U.S. Department of...

Stealthy malware 'Poweliks' resides only in system registry

A new malware program called Poweliks attempts to evade detection and analysis by running entirely from the system registry without creating files on disk, security researchers warn.

PANIC! Stop using USB (it's ''fundamentally broken'') #BadUSB

BadUSB: Karsten Nohl and friends set up us the bomb. USB gadgets are totally unsafe. That's the stark warning from Security Research Labs, to be given at Black Hat in Lost Wages. Basically, any USB device can do anything it wants...

Pop quiz: How many security holes can you spot?

Tech support pilot fish works at a college where student organizations are supplied with computers -- which makes security a challenge. "The university advisor for each student group is supposed to reset the local student-worker...

Load More