Skip the navigation

Security Topic Center

Get the latest news and in-depth analysis about IT security, including information about viruses and other malware, security patches, data protection and more

Security News

Former Qwest CEO out of prison, blames NSA for troubles

Revelations made by NSA leaker Edward Snowden would have given former Qwest CEO Joe Nacchio a fighting chance to beat insider-trading charges that garnered him a 70-month jail term, says Nacchio, who was released this month after serving four and a half years.
Read more...

Dell updates private cloud to become PCI compliant

Looking to solidify its refocused efforts on private cloud platforms, Dell today rolled out new features to improve security and manageability of its offerings.

Privacy group can's release Facebook response to its complaints

Campaign group Europe-v-Facebook received Facebook's response to complaints about the social networks' privacy policy on Tuesday, but was barred from publishing them by the Irish Data Protection Commissioner.

Shutdown could test IT security at federal agencies

A government shutdown that lasts more than a few days could test the ability of federal agencies to protect their information systems against security threats.

Intel to acquire network security firm Sensory Networks

Intel has signed a deal to acquire Sensory Networks, a provider of software pattern matching technology for network security applications.

Fake AdBlock Plus app removed from Google's Play store

Google has removed an application from its Play store that purported to be AdBlock Plus, a well-known application that blocks online ads.

Security company scours 'Dark Web' for stolen data

Alex Holden, founder of security company Hold Security, is in the business of bringing companies bad news.

Symantec seizes part of massive P2P botnet ZeroAccess

The cybercriminals behind ZeroAccess, one of the largest botnets in existence, have lost access to more than a quarter of the infected machines they controlled because of an operation executed by security researchers from Symantec.

Facebook widens Graph Search to include posts, status updates

Facebook has started to include more types of content in Graph Search, a tool for searching what others have been posting about on the social network

Tech firms push Congress for transparency on NSA surveillance

The U.S. Congress must act quickly on legislation that would make electronic data collection efforts by the U.S. National Security Agency more public, a group of tech firms, civil liberties groups and other organizations said Monday.

Security In Depth

7 sneak attacks used by today's most devious hackers

Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

Forget fingerprints: Your iris is your new identity

Dropping prices, fast processing speeds and more user-friendly designs have given a boost to this highly accurate biometric technology.

7 characteristics of a secure mobile app

When it comes to building secure mobile applications, errors most often occur in session management. By themselves, these mistakes do not present a significant risk, but the more mistakes made, the more vulnerable the application. And therein lies the problem: I often find several of these errors in any given app.

Kenneth van Wyk: High hopes for iPhone's Touch ID

The iPhone 5S is the first smartphone with fingerprint authentication. It's not perfect, but it could herald a new emphasis on security for mobile devices.

How to Overcome Small Business Data Recovery Challenges

Data recovery has mattered ever since businesses started relying on PCs in the workplace. Today's common storage options for small businesses all present some disaster recovery challenges. Here's what your organization should do to address them.

7 Biggest IT Compliance Headaches and How CIOs Can Cure Them

IT, security and compliance experts discuss the biggest issues facing companies these days -- and what steps organizations can take to minimize potential regulatory compliance risks and security threats.

Jay Cline: What will Snowden leak next?

What if NSA leaker Edward Snowden hasn't been reckless but instead is following a carefully thought-out plan? If so, we can make some guesses about what revelations will come next.

'HoneyDocs' lays irresistible bait for hackers

Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.

Security Manager's Journal: Two big goals for 2014 budget won't require a lot of money

Hardening the core will leverage many existing technologies.

Steven J. Vaughan-Nichols: Does Windows 8 help the government to spy on us?

TPM has always sounded like a good idea. But the problem with 'trusted computing' has alwasy been knowing how trustworthy it is.