Endpoint Security

Endpoint security news, trends, analysis and practical advice

goalie protection save 2
authentication

complex network

Three reasons you should care about technology asset management

After the recent discovery that a restaurant i frequented was processing my credit card on WIndows XP, I was reminded of the importance of technology asset management, for both hardware and software. It seems that many organizations...

strip protector

55% off Tripp Lite Rotatable Outlet Surge Protector Power Strip - Deal Alert

This power strip has a built-in surge protector, 6 rotatable outlets, an extra long 8 foot cord and a USB port for charging portable devices. Currently averages 4.5 out of 5 stars from almost 600 people on Amazon.

apc supply

48% off APC Back-UPS Pro Uninterruptible Power Supply - Deal Alert

The Back-UPS BR1500G offers guaranteed battery backup and surge protection for high performance computer systems, networks, external storage devices, game consoles and other electronics, and is currently offered at a 48% discount.

safe knob setting security

The 10 Windows group policy settings you need to get right

Configure these 10 group policy settings carefully, and enjoy better Windows security across the office .

endpoint security

Good security begins with the endpoint in mind

In my work with new customers, I have yet to find a single one who has even a simple majority of workstations -- or endpoints as they are often known -- patched properly. Since much of the malware in existence takes advantage of known...

female executive keyhole security

Here's what happens when you drop 200 USB sticks in public

It would be logical to assume that people know the risks around cybersecurity. A recent experiment challenges that assumption.

cancelling an it project

Intel Security to discontinue McAfee SaaS products

Some products will be replaced, but admins will need to start over for setup and configuration.

credit cards

Feud heats up over chip cards, FBI warning

A National Retail Federation attorney said that an updated FBI warning on chip card vulnerabilities waters down the need for PIN security.

spam 000005468488

Google fine-tunes spam-catching tools

Google reduced spam reaching inboxes to a fraction of a percent, but in the process sometimes misclassifies bulk-mailed messages like monthly statements and ticket receipts.

How to use a smart chip card

Some users will 'kick and scream' at paying with slower chip cards

Major U.S. banks have been rolling out new, secure smart chip debit and credit cards for months, but the real end-user impact hasn't yet been felt.

Internet cyber security

Web app attacks, PoS intrusions and cyberespionage top causes of data breaches

Web application attacks, point-of-sale intrusions, cyberespionage and crimeware were the leading causes of confirmed data breaches last year.

encryption

Yahoo puts email encryption plugin source code up for review

Yahoo released the source code for a plugin that will enable end-to-end encryption of email messages, a planned data-security improvement prompted by disclosures of U.S. National Security Agency snooping.

countdown

Five sneaky ways companies are changing employees’ security behavior

Like precocious teenagers, some employees don’t want to be told what to do when it comes to cyber security. Too many rules about what they can and cannot do with technology can lead to bad decisions that inadvertently put company data...

Free and cheap ways to learn about IT security

Free and cheap ways to learn about IT security

From recovering deleted files to setting up an intrusion detection system, these seven projects give you hands-on experience with an array of security tasks.

snowden

Link between NSA and Regin cyberespionage malware becomes clearer

Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for...

internet security with lock

6 DNS services protect against malware and other unwanted content

A good DNS service can protect users from a variety of unwanted Web intruders, including phishing sites and botnets. We look at six of them.

Hacker

Thunderbolt devices can infect MacBooks with persistent rootkits

The rogue code will run in the boot ROM and will be hard to detect or remove, a researcher said.

Hacker

Iranian hackers compromised airlines, airports, critical infrastructure firms

For the past two years, a team of Iranian hackers has compromised computers and networks belonging to more than 50 organizations from 16 countries, including airlines, defense contractors, universities, military installations, and...

Load More