security: Vulnerabilities and threats
Two-factor authentication is a good step. But for securing many sites, Twitter included, it's not enough.
FTC should crack down on wireless carriers and smartphone manufacturers that put their customers at risk by failing to update Android devices.
Video surveillance played a key role in identifying the suspects in Monday's tragic Boston Marathon bombing, setting a precedent for increasing...
What should your company take away from this week's attacks? Lock down unsecured DNS repeaters being exploited by attackers and prep DDoS response...
Three-year old "TeamSpy" espionage campaign should be a wake-up call. Lock down your remote-access tools, or else.
Evernote used the wrong security method to store passwords, cryptography experts say. Unfortunately, it's a common error.
Passwords keep proliferating, but do new technologies and approaches offer an alternative? Maybe.
Today's security software wastes valuable time by delivering data dumps, rather than focusing on trends. But you can create your own visualizations.
Focus on the sorry state of your information security defenses before worrying about the Chinese, Russians, hacktivists or cybercrime gangs.
May 22, 2013
Why do bad breaches happen to good companies? Here's a look at the most frequent causes.
May 21, 2013
Guantanamo Bay Naval Base authorities turn off Wi-Fi and social media after Anonymous threatened to shut them down.
May 21, 2013
Multi-year hacking campaign targeted mining companies, legal firms, Pakistan, Angolan dissidents and others in Pakistan, the U.S., Iran, China and...
May 20, 2013
Yahoo breach could have compromised 10% of all Yahoo user credentials. Meanwhile, Syrian Electronic Army targets The Financial Times.
May 17, 2013
Syrian hackers claim to battle American imperialism, media bias and Angelina Jolie.
May 16, 2013
DHS proposal would give private businesses access to the government's stockpile of zero-day secrets for a fee. But some say the program may...
May 14, 2013
Avoid these common "tunnel vision" mistakes when investigating a breach or hack.
May 13, 2013
Readers detail "frozen DNS Trojan" cold calls and "repairs" that lead to $882 in unauthorized wire transfers.
May 13, 2013
Our survey shows users aren’t fond of UTM appliances.
May 10, 2013
Company founder denies that Huawei employees would ever be forced to spy for China.
Mobile networks, banks, energy companies and other critical infrastructure providers could be required to report all breaches to EU authorities.
This Week's Issue
Free Print SubscriptionSubscribe
Current Government Issue
- Anytime, Anywhere: Mobile applications are the new way to extend government information and services to on-the-go citizens and employees.
- Big Changes For U.S. Intelligence: New initiative aims to shift the 17-member Intelligence Community from agency-specific IT silos to an enterprise environment of shared systems and services.
- Read the Current Issue