Security

Security news, analysis, research, how-to, opinion, and video.

Internet sign
blackberry passport

googleappsdeviceactivity ui

Google to Apps users: Take time to protect your accounts

To get employees more involved in securing their Apps accounts, Google has simplified how they monitor log-in activity and configure security settings.

gop sony hack fake

Faked hack? #GOP pwns Sony networks with cheesy #SKULL

Guardians Of Peace want a piece of la SNE: We're told that Sony's entire network is on lockdown. But what's with the childish skull defacement and tone-deaf hashtag? In IT Blogwatch, bloggers sound ever-so-slightly suspicious.

malware keyboard

Regin malware linked to attacks on Belgacom and a well-known cryptographer

After Symantec blew the lid on Regin on Sunday, computer security experts and companies say information has led to suspicions that the U.S. and U.K. are involved.

security eye biometric

Intel looks to tame passwords with biometrics

Intel wants you to use your body to log into email and online bank accounts.

nsa

NSA privacy chief defends agency's surveillance

The National Security Agency's surveillance programs are legal and under close scrutiny by other parts of the government, the agency's internal privacy watchdog said Monday.

Slack app

Slack now lets employers tap workers' private chats

Slack, whose chat app aims to help workers get stuff done, might now have them running scared.

regin malware diagram

Regin: Giving IT security reason to hope NSA is waaaay ahead on malware

U.S. IT security people had better hope Russia and China have nothing as sophisticated as Regin spyware

Detekt detects government surveillance malware

Detekt tool finds the Hacking Team's secret surveillance malware on PC

If you’ve ever wondered if the government has you under surveillance via your PC, then you need to run the new and free malware detection tool Detekt. It has already found traces of the Hacking Team's surveillance malware, but it also...

'Less' is more to malware authors targeting Linux users

Using the "less" Linux command to view the contents of files downloaded from the Internet is a dangerous operation that can lead to remote code execution.

Data Security

Network security needs big data

As the inadequacies of perimeter-centric defenses become clearer, the zero-trust model grows more appealing. As for ZTM, it will need big data to succeed.

regin 2003

REGIN: 'cyberspy' threat from 2003, snooped on Saudis, Russians, Belgians... [u5]

SYMC unleashes PR guns on 'advanced' Regin malware: Symantec shys away from blaming the perp, but the spotlight seems to be falling on the NSA and UK's GCHQ. In IT Blogwatch, bloggers open all Five Eyes, wide.

Traces of Regin malware may date back to 2006

Malware that Symantec says was probably developed by a nation state may have been used for as long as eight years, a length of time that underscores the challenges the security industry faces in detecting advanced spying tools.

Symantec IDs sophisticated 'Regin' malware

Symantec researchers have come across a particularly sophisticated piece of malware, called "Regin" that was likely developed by a nation state and has been used for spying for more than six years.

first-aid medicine cure patch remedy

Why is Microsoft updating Windows PCs for a security bug on the server?

When Microsoft released a critical update for Windows Server this month, it also pushed out a fix for several versions of the Windows OS -- even the technical preview for Windows 10.

Critical XSS flaws patched in WordPress and popular plug-in

New security updates for the WordPress content management system and one of its popular plug-ins fix cross-site scripting vulnerabilities that could allow attackers to take control of sites.

103014 hackers lead image

NSA chief worries most about cyberattacks on industrial systems

Hackers are targeting critical U.S. infrastructure, making defense of those networks a top priority, NSA chief Admiral Mike Rogers said Thursday.

Private property

Doxxing defense: Remove your personal info from data brokers

Don't want your home address or other personal info published to the world? This weekend, take an hour or two to make yourself a less visible target.

Priorities

Net admin pilot fish is a contractor in a large federal agency, and with several sites to keep track of, he needs the right tool for the job. But Information Security has a different idea.

Load More