Endpoint Security

Endpoint security news, trends, analysis and practical advice

encryption
countdown

Free and cheap ways to learn about IT security

Free and cheap ways to learn about IT security

From recovering deleted files to setting up an intrusion detection system, these seven projects give you hands-on experience with an array of security tasks.

snowden

Link between NSA and Regin cyberespionage malware becomes clearer

Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for...

internet security with lock

6 DNS services protect against malware and other unwanted content

A good DNS service can protect users from a variety of unwanted Web intruders, including phishing sites and botnets. We look at six of them.

Hacker

Thunderbolt devices can infect MacBooks with persistent rootkits

The rogue code will run in the boot ROM and will be hard to detect or remove, a researcher said.

Hacker

Iranian hackers compromised airlines, airports, critical infrastructure firms

For the past two years, a team of Iranian hackers has compromised computers and networks belonging to more than 50 organizations from 16 countries, including airlines, defense contractors, universities, military installations, and...

Wikimedia (CC)

Russians easily 'hack' webcams, like others have for YEARS

Webcam hacking is in the news -- and it's bad stuff. But...haven't people been circumventing webcam security using default passwords for years now? How too could anyone forget, recent news about the NSA hacking webcams?

Business system of technology devices and functions

Startup Outlier grabs endpoint forensic data without agent software

Outlier, a startup with a sound pedigree in network security, is launching an endpoint threat-detection system that sets itself apart from competitors by working without the need for an agent on every machine.

Hacker manipulating code

Hackers make drive-by attacks stealthier with fileless infections

Cybercriminals are increasingly infecting computers with malware that resides only in memory in order to make their attacks harder to detect.

computer hacker aa006208

Rigged industrial software site points to watering hole attack

Attackers have rigged the website of an industrial software firm with a sophisticated reconnaissance tool, possibly in preparation for attacks against companies from several industries.

New malvertising campaign hit visitors of several high-profile sites

Attackers redirected users to Web-based exploits by pushing malicious advertisements onto popular sites, researchers from Fox-IT said

Hackers prey on Russian patriotism to grow the Kelihos botnet

A recent spam campaign encouraged Russian speakers to install malware on their computers to participate in DDoS attacks, researchers said

US warns 'significant number' of major businesses hit by Backoff malware

More than 1,000 major enterprise networks and small and medium businesses in the U.S. have been compromised by a recently discovered malware package called "Backoff" and are probably unaware of it, the U.S. Department of...

Stealthy malware 'Poweliks' resides only in system registry

A new malware program called Poweliks attempts to evade detection and analysis by running entirely from the system registry without creating files on disk, security researchers warn.

PANIC! Stop using USB (it's ''fundamentally broken'') #BadUSB

BadUSB: Karsten Nohl and friends set up us the bomb. USB gadgets are totally unsafe. That's the stark warning from Security Research Labs, to be given at Black Hat in Lost Wages. Basically, any USB device can do anything it wants...

Pop quiz: How many security holes can you spot?

Tech support pilot fish works at a college where student organizations are supplied with computers -- which makes security a challenge. "The university advisor for each student group is supposed to reset the local student-worker...

Protecting email at a hacker conference

The upcoming hacker conferences, HOPE, Black Hat and DEFCON make this a good time to think about email security. Rather than end to end security, which requires both the sender and recipient to use the same security software, my...

New malware program targets banking data

There is yet another reason to be wary of spam email about bank transfers or invoices -- it could be carrying a new, cleverly designed malware program that steals financial information.

Will full encryption sideline Google's targeted ads?

Mining personal data to deliver targeted ads is the lifeblood of Google's business -- and of many other online firms. But what if that data dries up at the source?

Load More