Security

Security news, analysis, research, how-to, opinion, and video.

Senate bill would limit access to emails stored abroad

Legislation introduced in the U.S. Senate on Thursday aims to place limits on access by U.S. law enforcement agencies to emails and other communications stored abroad.

home depot

Apple logo, patched up

Apple delivers final non-security Mavericks update

Apple on Wednesday released OS X 10.9.5, what is most likely the last non-security update for Mavericks, just weeks before the company will ship Yosemite.

Virtual model car wireless internet security

Once your car's connected to the Internet, who guards your privacy?

As more mobile devices connect to in-car infotainment and diagnostic systems -- and cars wirelessly connect to other vehicles, automated homes and roadways -- where you are and what you’re doing in your car could suddenly become very...

Apple iOS 8 on iPhone

Apple's iOS 8 fixes enterprise Wi-Fi authentication hijacking issue

iOS 8 addresses a serious flaw that could allow attackers to hijack the wireless network authentication of Apple devices and get access to enterprise networks.

Carlsberg taps Office 365 to connect 20,000 global employees

Global brewing brand gives cloud collaboration tools to 20,000 staff.

Encryption

Google to turn on encryption by default in next Android version

Google is turning on data encryption by default in the next version of Android, a step that mirrors broad moves in the technology industry to ensure better data security.

U.S. Navy drone

The Navy flew its new drone across the US Wednesday night

The U.S. Navy's new surveillance drone completed its first cross-country flight across the United States Wednesday night.

China says US hacking accusations are 'totally groundless'

The Chinese government says accusations that it was involved in cyberattacks against U.S. transportation contractors are "totally groundless and untenable."

Healthcare.gov still lacks some basic security controls

Healthcare.gov lacks several basic cybersecurity controls -- including strong passwords and consistent security patching -- nearly a year after the troubled launch of the insurance-shopping website, a government auditor said.

bittorrent bleep2

BitTorrent opens Bleep peer-to-peer encrypted chat program to public testing

Nine months after revealing plans to develop a decentralized and encrypted chat application, BitTorrent opened public testing for Windows, Mac and Android versions of the program. Called Bleep, the application supports voice...

applecdn primary

Apple updates privacy policy, moves to reassure users

Apple has outlined a new privacy policy and set up a site to explain what data it collects from users and how it handles that information.

U.S. military didn't know of Chinese attacks against transport contractors

The U.S. Defense Department plans to tighten reporting of cyber incidents against transportation contractors after finding the military was mostly left in the dark about successful attacks from China in 2012 and 2013.

New device to help cops detect texting and driving

How will new device to help cops detect texting drivers know it wasn't the passenger?

A new 'radar gun' type gadget is being developed to help cops catch texting drivers, but how will the device tell the difference between texting while driving, voice-to-text, automatic replies and a passenger in the car who is doing...

Adobe releases previously delayed patches for Reader and Acrobat

After a one-week delay, Adobe Systems has released security updates for Reader and Acrobat to patch critical vulnerabilities that could lead to computers being compromised.

metric ruler

The security function needs SMART metrics

Our manager has learned to love metrics and finds them useful as the new security operations center gets off the ground.

Cloud computing security lock.

Apple turns on iCloud two-step verification after nude selfie scandal

Apple on Tuesday began offering an additional security protection for iCloud users, a move the company made following the theft of nude photos from several celebrities' accounts last month.

Apple iOS 8 on iPhone

How IT should prep for iOS 8

iOS 8 isn't as much of a paradigm shift for enterprise users as some earlier releases, but that doesn't mean IT departments can easily it write off. Ryan Faas explains what's important.

Hackers had access to Goodwill hosting provider for 18 months

Hackers evaded security systems for 18 months at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data.

NSA reform bill stalled with Congress headed toward fall recess

The U.S. Congress is unlikely to pass legislation to end the National Security Agency's widespread collection of U.S. telephone records before leaving Washington, D.C., on a two-month break.

Load More