Don't-Miss Security Stories

Microsoft CEO Satya Nadella

Microsoft touts new, holistic approach to enterprise security

Microsoft combines the attack protection, detection and response features built into Windows 10, Office 365, Azure and the Microsoft Enterprise Mobility Suite to help enterprises improve their operational security posture.

Locksmart padlock

The traditional padlock gets the “smart” treatment

Dog & Bone’s new LockSmart padlock uses Bluetooth technology to eliminate the worry of lost keys and forgotten combinations.

on techhive.com

antivirus stock image

New Dell partnership casts doubt on traditional antivirus programs

A new partnership Dell announced on Tuesday signals how cybersecurity defenses are evolving, which could have long-ranging effects on vendors like Symantec, McAfee and Trend Micro.

Siegfried Rasthofer Steven Arzt Black Hat Europe 2015

Millions of sensitive records exposed by mobile apps leaking back-end credentials

Thousands of mobile applications use cloud-based, back-end services in an insecure way, allowing anyone to access millions of sensitive records created by users, according to a recent study.

security code big data cyberespionage

State-sponsored cyberspies inject victim profiling and tracking scripts in strategic websites

Security researchers from FireEye have discovered an attack campaign that has injected computer profiling and tracking scripts into over 100 websites visited by business executives, diplomats, government officials and academic researchers.

Ad tracking tech uses high-frequency audio to communicate between devices

A technology watchdog group says that so-called "ultrasonic tracking" techniques make it easier to track your activities across multiple devices—including your TV.

bitlockericonhero

BitLocker encryption can be defeated with trivial Windows authentication bypass

A researcher disclosed a trivial Windows authentication bypass that puts data on BitLocker-encrypted laptops at risk.

nikhil mittal black hat europe 2015

Continuous integration tools can be the Achilles heel for a company's IT security

Some of the most popular continuous integration tools used by software development teams have not been designed with security in mind and can open a door for attackers to compromise enterprise networks.

Security

Cybercriminals turn to video ads to plant malware

Cybercriminals have been delivering malware through online display ads for years, but they appear to be making headway with a new distribution method: video advertisements.

ransom note blackmail

Ransom attacks likely to fade as small email providers resist

The spate of cyberattacks against email providers is likely to pass with time as they refuse to pay ransoms. But that doesn't mean the attacks haven't cost them.

self encrypting hard drives black hat europe 2015

Self-encrypting drives are hardly any better than software-based encryption

Two researchers demonstrated attacks against self-encrypting drives used in enterprise environments at the Black Hat Europe conference in Amsterdam.

outlook 2016 mac icon

Patch Tuesday Windows security update rendered Outlook unusable for many

Users reported login failures, driver crashes, and other problems, though Microsoft has now issued a new patch.

code big data binary programming

Thousands of Java applications vulnerable to nine-month-old remote code execution exploit

A serious vulnerability in a popular Java library puts thousands of Java applications and servers at risk of remote code execution attacks.

fsecuresense

F-Secure's Sense anti-virus hardware protects every device in your home, from PCs to TVs

F-Secure Sense is a $199 anti-virus box for phones, tablets, computers and smart home products.

mabouia mac ransomware

Mac ransomware is nothing to worry about—for now

Security researchers say a second experiment showing how easy it is to write ransomware for Apple Macs isn't surprising, so it's likely that hackers will eventually target Apple computers with it.