security: Vulnerabilities and threats

NSA Dragnet Debacle: What It Means To IT
PRISM shows companies can't assume their data is safe in the hands of commercial providers.

Twitter's Two-Factor Authentication: 5 Reasons To Avoid
Two-step verification system has no provision for backup access or lost phones, doesn't address public username problem.

Twitter Two-Factor Authentication: Too Little, Too Late?
Two-factor authentication is a good step. But for securing many sites, Twitter included, it's not enough.

Android Smartphone Sellers Should Patch, Refund Or Perish
FTC should crack down on wireless carriers and smartphone manufacturers that put their customers at risk by failing to update Android devices.

Boston Bombers Can't Elude City's Tech Infrastructure
Video surveillance played a key role in identifying the suspects in Monday's tragic Boston Marathon bombing, setting a precedent for increasing...

Spamhaus DDoS Attacks: What Business Should Learn
What should your company take away from this week's attacks? Lock down unsecured DNS repeaters being exploited by attackers and prep DDoS response...

Unpatched Remote Access Tools: Your Gift To Attackers
Three-year old "TeamSpy" espionage campaign should be a wake-up call. Lock down your remote-access tools, or else.

Password Police Cite Evernote Mistakes
Evernote used the wrong security method to store passwords, cryptography experts say. Unfortunately, it's a common error.

Kill Passwords: Hassle-Free Substitute Wanted
Passwords keep proliferating, but do new technologies and approaches offer an alternative? Maybe.

Security Tools Show Many Dots, Few Patterns
Today's security software wastes valuable time by delivering data dumps, rather than focusing on trends. But you can create your own visualizations.
Top Stories
-
Microsoft Dangles $100,000 Bug Bounty
June 19, 2013One hitch: The bugs might be worth more on the open market.
-
Google Defends Efforts Against Rogue Pharmacies
June 18, 2013Under fire from law enforcement officials, Google insists it has been making progress in its effort to deny advertising to rogue pharmacies.
-
CrowdStrike Falcon Traces Attacks Back To Hackers
June 18, 2013Startup that encourages playing offense on security launches cloud-based service to help businesses identify adversaries, mitigate attacks and...
-
Thumb Drive Security: Snowden 1, NSA 0
June 14, 2013Thumb drives helped NSA whistle-blower Edward Snowden transport top-secret data from the agency. If the NSA can't keep a lid on thumb drives, can you?
-
Inside A Cyber Espionage Campaign
June 14, 2013A group of Taiwanese researchers peer into the operations center of a group behind one large espionage campaign.
-
Vulnerability Reports: What They Don't Tell You
June 14, 2013With flaw tallies varying by up to 75%, vulnerability data needs to be taken with a grain of salt, Black Hat presenters say.
-
Bug Data Buys Businesses Intel From U.S. Government
June 14, 2013Thousands of businesses are reportedly exchanging information with the government on zero-day vulnerabilities and online threats in return for...
-
Teachers Get Digital Hotline To Police
June 12, 2013CopSync911 app lets teachers and other workers bypass dispatchers and access first responders more quickly in emergency situations.
-
NSA Prism Fallout Delays EU Airline Database Vote
June 12, 2013Accusations of "paranoia" and discrimination against non-U.S. citizens aired in Brussels this week -- though the importance of working with...
-
12 Security Myths That Put Users At Risk
June 11, 2013Security experts weigh in on the dirty dozen misconceptions that make endpoints vulnerable.
More
News »
Slideshows
Resource Links
Top Story
Europe Weighs New Data Breach Rules For Critical Companies

Mobile networks, banks, energy companies and other critical infrastructure providers could be required to report all breaches to EU authorities.
More News
Related Webcasts
This Week's Issue
Free Print Subscription
SubscribeCurrent Government Issue
- Anytime, Anywhere: Mobile applications are the new way to extend government information and services to on-the-go citizens and employees.
- Big Changes For U.S. Intelligence: New initiative aims to shift the 17-member Intelligence Community from agency-specific IT silos to an enterprise environment of shared systems and services.
- Read the Current Issue