Advertisement
Security
Subscribe to Security

The Lead

Future-Proof Secure Hardware Root Of Trust Technology For IoT Applications

November 21, 2014 9:42 am | by Elliptic Technologies | Product Releases | Comments

Elliptic Technologies, a leading provider of embedded security solutions for the connected world, today unveiled tRoot, its future-proof secure hardware root of trust technology targeting the increasing security challenges in the Internet of Things (IoT).

Feds Say Web Privacy Firm Deceived Consumers

November 18, 2014 9:56 am | by Brandon Bailey, AP Technology Writer | News | Comments

Federal regulators said a respected Internet privacy company gave its seal of approval to...

AT&T Drops 'Super Cookies'

November 17, 2014 9:41 am | by Jack Gillum, Associated Press | News | Comments

AT&T Mobility, the nation's second-largest cellular provider, says it's no longer attaching...

BlackBerry Expanding Its Mobile-Security Arsenal

November 14, 2014 10:30 am | by The Associated Press | News | Comments

BlackBerry is expanding its efforts to sell mobile-security software on its rivals' smartphones...

View Sample

FREE Email Newsletter

Daily news and top headlines for IT professionals

Privacy Advantages Of Using A Datacenter In Iceland

November 10, 2014 11:48 am | by Natalie Lehrer | Blogs | Comments

According to most data security analysts, Iceland is often referred to as the most privacy-friendly nation for hosting sensitive data. Because data files are becoming larger, it becomes more practical to host data in one central location where it can be readily accessible from any where in the world.

Cybersecurity Firm IDs New Apple-Targeting Malware

November 6, 2014 10:00 am | by The Associated Press | News | Comments

Palo Alto Networks has discovered a new form of malware that may have affected hundreds of thousands of Apple mobile device users.                                   

Security Contractor Breach Unnoticed For Months

November 4, 2014 1:07 pm | by Stephen Braun, Associated Press | News | Comments

A cyberattack similar to previous hacker intrusions from China penetrated computer networks for months at USIS, the government's leading security clearance contractor, before the company noticed, officials and others familiar with an FBI investigation and related official inquiries told The Associated Press.

Advertisement

Walk, Don’t Run: A Security Framework For Midsize Organizations

October 29, 2014 12:08 pm | by Jeff Multz | Articles | Comments

Companies think their network is secure because they bought a product or service, and then they rest. You can’t rest. You need to consistently monitor and analyze your network while investing in training and security updates.        

As Wearables Market Grows, Businesses Need To Focus On Privacy

October 28, 2014 1:01 pm | by USA TODAY | Videos | Comments

Twenty percent of adults in the U.S. already own a wearable device — and that number is quickly expected to rise, according to a new report by PricewaterhouseCoopers.                        

Application Recommendations For Wireless EtherNet/IP

October 28, 2014 12:50 pm | by Eduard Polyakov | Articles | Comments

Deploying a wireless network requires thoughtful planning and design, as well as periodic monitoring to meet expectations for bandwidth, throughput, reliability and security.                     

Apple CEO Says Apple Pay A Success

October 28, 2014 9:47 am | by Brandon Bailey, AP Technology Writer | News | Comments

Apple CEO Tim Cook said Apple's new mobile payment system had over 1 million activations in the first three days after it became available, and is now more widely used than any competing payment system.             

Apple Issues Security Warning For iCloud

October 22, 2014 10:03 am | by Brandon Bailey, AP Technology Writer | News | Comments

Apple has posted a new security warning for users of its iCloud online storage service amid reports of a concerted effort to steal passwords and other data from people who use the popular service in China.             

Advertisement

FTC Names Privacy Expert As Chief Technologist

October 22, 2014 9:37 am | by Brandon Bailey, AP Technology Writer | News | Comments

The Federal Trade Commission on Tuesday named an outspoken Internet privacy expert, Ashkan Soltani, as its chief technologist in a move that signals the agency's focus on protecting consumers' online privacy.            

Staples Investigating Possible Data Breach

October 21, 2014 1:34 pm | by The Associated Press | News | Comments

Staples is looking into a potential credit card data breach and has been in touch with law enforcement officials about the issue.                                   

Hackers, Downtime And Deathmobiles In The Age Of IoT

October 20, 2014 12:27 pm | by Jeff Reinke, Editorial Director | Blogs | Comments

It seems that many in manufacturing operations and IT are being tasked with quelling security fears instead of being given the opportunity to address these concerns, and leverage the advantages of greater enterprise-wide connectivity.     

JPMorgan CEO Says More Should Be Done On Cyberattacks

October 14, 2014 2:03 pm | by Steve Rothwell, AP Business Writer | News | Comments

JPMorgan Chase's CEO Jamie Dimon says that more coordination between businesses and government is needed to combat the rising threat of cyberattacks.                             

Millions Of Voiceprints Quietly Being Harvested

October 13, 2014 1:21 pm | by Raphael Satter, Associated Press | News | Comments

Businesses and governments around the world increasingly are turning to voice biometrics, or voiceprints, to pay pensions, collect taxes, track criminals and replace passwords.                     

Advertisement

Norton Antivirus Maker Splitting Into 2 Companies

October 10, 2014 9:56 am | by The Associated Press | News | Comments

Security software maker Symantec is the latest company to announce plans to split itself into two.                                           

App Aims To Replace Zany Passwords

October 9, 2014 12:42 pm | by USA TODAY | Videos | Comments

A two-step authentication application called Authy, which is backed by Cameron Winkelvoss, already has 1 million users.                                     

JPMorgan Chase Hacking Shows Growing Cybercrime Threat

October 8, 2014 11:37 am | by CBS News | Videos | Comments

JPMorgan Chase reported hackers have stolen information from about 83 million customers. Anthony Mason reports how these cyber attacks are happening far more often than most people realize.                 

Apple And Google Take On U.S. Gov't Over Encryption

October 7, 2014 12:21 pm | by Bloomberg News | Videos | Comments

While the newest Apple and Google smartphones will automatically encrypt data stored on them, that won’t keep U.S. law enforcement and intelligence agencies from obtaining evidence linked to the devices.             

Two State AGs Looking Into JPMorgan Data Breach

October 6, 2014 9:57 am | by The Associated Press | News | Comments

JPMorgan said Thursday that the breach compromised customer information pertaining to roughly 76 million households and 7 million small businesses.                             

Google Chairman: Tim Cook Is Wrong About Us

October 2, 2014 1:10 pm | by CNNMoney | Videos | Comments

Google's Eric Schmidt and Jonathan Rosenberg tell Christine Romans why Google is the safest place on the web, and why they hired Sheryl Sandberg without having a job for her.                     

The New Threat That’s Worse Than Heartbleed

October 2, 2014 1:01 pm | by Jon Minnick, Associate Editor | Blogs | Comments

Just because you have the right services in place with smart people watching over and securing your data, don’t ever think the job is done. A new threat has arrived, and it is much worse than Heartbleed.             

Feds Say Hackers Targeted Microsoft, Game Developers

October 1, 2014 9:30 am | by Randall Chase, Associated Press | News | Comments

Two members of an international hacking ring that gained access to a U.S. Army computer network while targeting computer giant Microsoft and several video game developers pleaded guilty to conspiracy charges Tuesday in federal court in Delaware.

3 Tips For Fortifying Your Network

September 30, 2014 11:41 am | by Dan McGrath | Articles | Comments

Many industrial operations struggle to find the right approach to protect their assets. Instead of designing protections into their systems, some manufacturers wrongly rely on their system’s complexity to keep assets hidden.       

'Shellshock' Can Hack Lights In Your Home

September 30, 2014 11:24 am | by CNNMoney | Videos | Comments

Jose Pagliery breaks down the shellshock vulnerability and explains which devices could be affected.                                           

Training Cybercrime-Fighters To Think Like Criminals

September 29, 2014 12:57 pm | by CBS News | Videos | Comments

In the war on cybercrime, Charles Largay is training the next generation of cops on the beat. By showing them how to break into computer networks, Largay is teaching his students to think like the bad guys.             

Cyber Experts Warn Of 'Bash' Bug

September 25, 2014 9:55 am | by The Associated Press | News | Comments

New warnings are emerging of a security flaw known as the "Bash" bug, which cyber experts say may pose a serious threat to computers.                                 

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading