Security

Security news, trends, analysis and practical advice

code programming software bugs cybersecurity

Cisco issues critical warning after CIA WikiLeaks dump bares IOS security weakness

A vulnerability in Cisco’s widely deployed IOS software that was disclosed in the recent WikiLeaks dump of CIA exploits has triggered the company to release a critical warning for its Catalyst networking customers.

airplane cabin Airbus plane

U.S. bans electronics larger than smartphones in cabins on some flights

The U.S. Department of Homeland Security has ordered that passengers on flights departing for the U.S from 10 airports in the Middle East and Africa will have to carry personal electronics larger than a smartphone as checked baggage,...

p1200649

Mozilla beats rivals, patches Firefox's Pwn2Own bug

Mozilla has already patched a Firefox vulnerability revealed during Pwn2Own, the first vendor to fix a flaw disclosed at the hacking contest.

Russia

Russia will strike U.S. elections again, FBI warns

Future U.S. elections may very well face Russian attempts to interfere with the outcome, the FBI and the National Security Agency warned on Monday.

Security online

Pwn2Own ends with two virtual machine escapes

Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.

1 gap

Fragmentation: the silent killer in security management

Today’s detection deficit between attackers and defenders is near an all-time high – and the gap is only getting wider. While many factors contribute to this deficit, among the top is the fragmentation of people, processes, and...

1 threatening

7 universal rules of threat intelligence

Recorded Future will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not.

girl hands privacy stop

Private photos of more celebrities leaked in Fappening 2.0

Photos and videos of more and more celebrities leak in the latest round The Fappening 2.0.

FBI Comey

FBI confirms probe of Russian hack of U.S. election, possible Trump involvement

The FBI is actively investigating Russia's attempts to influence the 2016 U.S. presidential election and possible cooperation from President Donald Trump's campaign, agency director James Comey confirmed.

strategy partners

The ultimate guide to strategic tech partners

In today’s fast-changing vendor landscape, market leaders are facing new challengers in security, data center, cloud, networking and wireless.

bundesdruckerei goid

Bdrive secures files in the cloud with fingerprints, fragmentation

Maximum privacy seems to be the goal for the new enterprise authentication and cloud storage services Bundesdruckerei is showing off at Cebit this week.

Edward Snowden Spiegel headline

Cebit showcases security after Snowden

It's almost four years since Edward Snowden leaked U.S. National Security Agency documents revealing the extent of the organization's surveillance of global internet traffic, but he's still making the headlines in Germany.

Ubiquiti called out for security flaw

SEC Consult reported a flaw four months ago. Still no fix.

secusuite for samsung knox 1

BlackBerry preps a more secure Samsung Galaxy S7

Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year.

facial recognition

It's time to face the ugly reality of face recognition

Most forms of biometric data are hard to get, and you usually need someone's permission to capture fingerprint or iris scans. But anyone can take a picture of your face.

Digital Key encryption

US-CERT: Some HTTPS inspection tools could weaken security

Companies that use security products to inspect HTTPS traffic might inadvertently make their users' encrypted connections less secure and expose them to man-in-the-middle attacks, the U.S. Computer Emergency Readiness Team warns.

stolen credit card

Credit-card breach hits another restaurant chain

Several high-end eateries run by Select Restaurants in Cleveland were the victims of fraudulent cards used by customers at its eateries.

p1200734

Minn. police seek data on who Googled a victim's name

Local police in Minnesota are trying to solve a bank fraud scheme by demanding Google give up data on people who looked up key search terms that may be related to crime.

security hacker privacy

String of fileless malware attacks possibly tied to single hacker group

Several attacks observed over the past few months that rely heavily on PowerShell, open-source tools and fileless malware techniques, might be the work of a single group of hackers.

facebook twitter google plus social media logos

Social media companies have a month to update service terms in the EU

Facebook, Twitter and Google have been given a month to make changes to their user agreements in the European Union or face "enforcement action."

Load More