Don't-Miss Security Stories

jeep renegade latitude

Fiat Chrysler voluntarily recalls 7,810 SUVs over software issues

Fiat Chrysler said Friday it is voluntarily recalling 7,810 SUVs due to a software glitch that could make the vehicles vulnerable to remote control.

tented arch in a left index fingerprint

NIST sets the stage for contactless fingerprint readers

While many are hoping that biometric technologies such as fingerprint readers will one day replace cumbersome passwords, the U.S. National Institute of Technology is looking even further out.


LinkedIn-based intelligence gathering campaign targets the security industry

A LinkedIn-based intelligence gathering campaign has been using fake LinkedIn profiles to map out the professional networks of IT security experts.

French ISPs petition court to overturn secret foreign surveillance decree

Two French ISPs have asked France's highest court to overturn a secret government decree defining how French security services can scoop up foreign Internet traffic. They claim the decree is unconstitutional.

Panasonic Nubo security cam uses 4G and battery power to work anywhere

Is it a Nest Cam killer? The Nubo is packed with features, and even gives you security vision when you're on the road, and without a WiFi connection.

Even encrypted medical record databases leak information

A new study from Microsoft researchers warns that many types of databases used for electronic medical records are vulnerable to leaking information despite the use of encryption.

hack security malware

Shopperz adware takes local DNS hijacking to the next level

The Shopperz adware program uses a cunning technique to make DNS (Domain Name System) hijacking harder to detect and fix.

Web attack silently modifies DNS configurations in routers

Despite reports of hacking, baby monitors remain woefully insecure

A security analysis of nine baby monitors from different manufacturers revealed serious vulnerabilities and design flaws that could allow hackers to hijack their video feeds or take full control of the devices.

Checking mobile phone

Employees put business data at risk by installing gambling apps on their phones

The average company has more than one gambling application installed on some of its employees' mobile devices, and in some cases as many as 35.

hp dma screen shot 2

HP beefs up enterprise security suite with tools to root out malware, app vulnerabilites

Hewlett-Packard has added machine learning analysis capabilities to its Fortify application testing service, and introduced a new service for checking DNS requests for malware attacks.

Verizon to introduce SDN security feature later this month

Verizon will introduce a virtualized firewall service across its global network later this month, part of its move into software-defined networking.

vmworld martin casado

VMware pitches network virtualization for better security

While the idea of network virtualization has been around a while, it has not been adopted in the enterprise as quickly as virtualization for servers. Now, VMware, one of the biggest proponents of virtualizing the entire data center, is touting one tangible benefit to the virtual network: better security.

generic image of a wi-fi router

Popular Belkin Wi-Fi routers plagued by unpatched security flaws

The Belkin N600 DB wireless dual band router model has unpatched vulnerabilities that could allow hackers to compromise affected devices.

Intel's new power-efficient graphics core

Intel says GPU malware is no reason to panic—yet

Malware that runs inside GPUs (graphics processing units) can be harder to detect, but is not completely invisible to security products.

android malware

Your brand new phone could still have malware

Security company G Data has identified more than 20 mobile phones that have malware installed despite being marketed as new, according to a research report.

hardware security embedded circuit board integrated controller

Sick of memorizing passwords? A Turing Award winner came up with this algorithmic trick

Passwords are a bane of life on the Internet today, but one Turing Award winner has an algorithmic approach he thinks could make them not only easier to manage but also more secure.