Security news, trends, analysis and practical advice

google disconnect

New SOHO router security audit uncovers more than 60 flaws in 22 models

Some of the vulnerabilities could allow attackers to take over the affected devices.

data privacy

Who should get the blame in IRS breach?

The IRS may need to re-think the security process it uses to check taxpayer identities for its Get Transcripts app.

yahoo icon

Yahoo tries legal pirouettes in court, breaks neck

One of the company’s arguments: Yahoo Mail customers should notify anyone who emails them that any email they send to the customer could be scanned by Yahoo — presumably including the original email already sent before the customer...

google privacy settings

Google's new privacy settings page aims to gives users more control

Google has launched a centralized hub that lets users manage the privacy and security controls of all its services, and introduced a site with information about these topics.

facebook menlo park building logo full

Facebook to send encrypted emails as users add PGP key to profile

Some Facebook users should soon be able to receive encrypted emails from the social networking site if they add PGP public keys to their profiles.


Russia Photoshopped satellite images to blame Ukraine for shooting down MH17: report

After a team of investigators conducted forensic analysis of satellite images provided by the Russian government as "proof" that Ukraine shot down Malaysia Airlines Flight MH17, the group found the images to be digitally altered and...

DNS Internet connections IoT

ARM looking to boost IoT security with upcoming acquisition

By buying Israeli company Sansa Security, ARM will be able to better protect all kinds of connected devices.


Senate delays vote on NSA phone records dragnet

Section 215 of the Patriot Act expires without a final Senate vote, although lawmakers may act this week.

internet gavel keyboard

Update: Silk Road mastermind Ross Ulbricht sentenced to life in prison

Ross Ulbricht, the creator and chief operator of the Silk Road, has been sentenced to two life sentences in jail for running the online drug marketplace.

nsa sign

New NSA phone dragnet proposals blasted as flawed

Proposals to renew portions of the Patriot Act wouldn't end bulk phone records collection, critics say.

chess 775346 1280

Threat intelligence -- making it useful from the enterprise to the small business

The term "threat intelligence" surfaced a few years ago. It is unclear where the term originated, and there is not complete agreement on exactly what it means. The deliverable is knowledge of a threat enough in advance to prevent a...

Tor connections to hidden services could be simple to de-anonymize

It's safer to access Internet websites over Tor than hidden services, researchers said

cracked foundation

Majority of websites have serious vulnerabilities

In a recent analysis of more than 30,000 websites, most had at least one serious vulnerability for 150 or more days last year

mobile retail2

FTC cracks down on mobile shopper tracking service, but could it possibly matter less?

When the FTC recently cracked down on a vendor that tracks shoppers' movements via their mobile devices and sells the data to retailers, it could have made a statement about what limits and notifications need to be in place. Instead,...


5 tips for keeping your incident response team happy

These highly skilled, multitasking, (slightly unconventional) security rock stars have a lot to offer beyond security fire drills and threat research.

internal security risks

How employees put your organization at risk

Security threats don't come only from the outside. The biggest threats are often sitting right in the office. Whether it's adult websites or social media, employees are accessing content that puts your business at risk.

Wi-Fi sign

Wi-Fi access point scans can betray a person's location

Many Android applications collect information on Wi-Fi access points, which researchers contend can be used to figure out where a person is more than 90 percent of the time.

A fly using a walker

Superbugs: 11 software bugs that took far too long to meet their maker

All software has bugs, but even the most well known applications can have errors and vulnerabilities that somehow go undetected for years - or decades.

Load More