Distributed denial-of-service attacks are mounting, so the Cloud Security Alliance formed the Anti-Bot Working Group to help fight this threat.
Many businesses of different types struggle with policies for setting clear boundaries for use of personal devices, especially mobile ones.
The cyber-gang running the CryptoLocker extortion racket is splitting its ransomware take with criminal botnet owners, says Symantec, which is monitoring this underworld activity online.
An alarming growth in malware signed with fraudulently obtained keys and code-signing certificates in order to trick users to download harmful code is prompting Microsoft and Symantec to push for tighter controls in the way the world's certificate authorities issue these keys used in code-signing.
McAfee research indicates that a steep rise in the amount of malware signed with legitimate digital certificates—not forged or stolen ones—is a growing threat.
Java was the most targeted development platform for exploit attacks during the first half of the year, and attacks have increasingly shifted to zero-day vulnerabilities, according to F-Secure's new threat report.
In his keynote address at a security conference, Apple co-founder Steve Wozniak admitted he has enjoyed many adventures in hacking often for the sake of pranks, especially in his college days and the early years of working on computers and the Internet.
The National Security Agency's director of information assurance said the route to "confidence in cyberspace" is to increase collaboration between the government and the high-tech industry.
The U.S. Postal Service is exploring a new future running a cloud-based authentication service for the government, under a three-year $15.12 million contract for some foundation technology to build a cloud-based authentication exchange.
The disclosures about the NSA's massive global surveillance by former tech worker Edward Snowden is hitting the U.S. tech industry hard as companies continue to try to explain their involvement in the data-collection program.
Dell today said it's ready with new anti-malware defense and encryption offerings for businesses using its PCs, laptops and Android-based mobile devices.
Security monitoring can be done in some public cloud environments, according to Gartner; and if you're using public cloud services, it may be time to think about doing it.
A Gartner report about the security software market out today shows that No. 2 ranked McAfee enjoyed the most overall growth last year, Trend Micro slipped but stayed No. 3, and Symantec held onto its top spot in the $19.1 billion market.
The Department of Homeland Security last week said it notified employees and others with DHS clearance to be on alert for potential fraud due to a vulnerability discovered in software used by a vendor to process personally identifiable information for background investigations. The software hole in had existed since July 2009.
A study of vulnerabilities in about 15,000 websites found 86 percent had at least one serious hole that hackers could exploit, and “content spoofing” was the most prevalent vulnerability, according to WhiteHat Security’s annual study.
Articles by Ellen MessmerNext Page