U.S. Military Must Step Up Top Brass Training to Thwart Cyber-Attacks
NEWS ANALYSIS: A quick training session after a network breach is certainly a good idea, but the Joint Chiefs of Staff need to apply military practices to solving their phishing problem. When the...
View ArticleVodafone Ireland launches new security software to help protect customers
User-friendly service allows increased security while browsing and features child protection toolsDublin, 13th August 2015: Vodafone Ireland has launched Vodafone Secure Net, a new service that offers...
View ArticleApple Updates OS X 10.10 to Patch Security Vulnerabilities
In OS X 10.10.5, Apple patches multiple issues, including one first publicly disclosed in July. Apple has come out with what could be its last major update to OS X 10.10 before the release of OS X...
View ArticleAndroid’s Stagefright Flaw Returns, Google Issues Patch
Google last week claimed it had fixed the Stagefright flaw, but it is back. Or did it ever actually really get fixed in the first place? Among the big stories to break at the Black Hat USA conference...
View ArticleESET Virtual Appliance Remotely Manages Network Endpoint Security
REVIEW: ESET seeks to reduce the complexity of managing endpoint security on an enterprise network with the ESET Remote Administrator v6, which is now available as a virtual appliance. Endpoint...
View ArticleUber to quadruple cybersecurity team to protect drivers from attacks
100-strong team will aid protection of 'polarising' drivers, along with increasing data security and hack prevention
View ArticleKali Linux 2.0 Moves to Rolling Releases, Gains More Security Tools
Kali Linux has emerged in recent years to be among the most popular security-focused Linux distributions. Originally known as Backtrack Linux, Kali Linux was renamed and rebuilt in March 2013 with the...
View ArticleHackers can make phishing attempts look like emails from your CEO
Michael Cock, group IT manager at Sutton and East Surrey Water, tells Computing employees have received phishing attempts in emails which appear to be f...
View ArticleBusinesses See Sharp Rise in Targeted Attacks
The vast majority (86 percent) of respondents said they have seen an increase in targeted attacks directed at their networks over the last year. Nearly two-thirds of organizations (64 percent) believe...
View ArticleProfessional Services Firms – A Soft Route To The Hackers’ Real Target?
By Ian Kilpatrick, chairman Wick Hill Group All companies today are at risk from a successful attack on their IT systems. It’s widely acknowledged that it’s no longer a question of if you will be...
View ArticleGeorgia Tech Finds 11 Deep Security Flaws in Chrome, Firefox
The security researchers developed a new cyber-security analysis method that discovered the holes buried deeper in the systems. Researchers from the Georgia Institute of Technology College of...
View ArticleIRS Breach More Extensive Than First Reported
The IRS now believes that the attack against its system affected more than 300,000 taxpayers. Security experts weigh in on the new information. The U.S. Internal Revenue Service is mailing letters to...
View ArticleNetwork Analytics Provider Corvil Adds Security with iSIGHT
Corvil takes iSIGHT's threat intelligence into its real-time data analytics engine, then streams event hits into Splunk or ArcSight to paint a true picture of security risks. Network data analytics...
View ArticleCyber-Criminals Target Another Network Service to Amplify DDoS Attacks
Level3 finds cyber-attackers are increasingly abusing another common network service known as portmap, or portmapper, to amplify their attacks. Attackers have started using a common network service to...
View ArticleIRS Data Breach Shows the Risk of Trying to Help Taxpayers
NEWS ANALYSIS: The Internal Revenue Services learns the dangers of using the Internet to try to make things a bit easier for taxpayers. The Internal Revenue Service is one of the federal government's...
View ArticleLinus Torvalds Talks Linux Security at LinuxCon
The founder of Linux explains why he's not thinking about the next 10 years of Linux and why security is all about finding bugs. SEATTLE—At the annual LinuxCon event here, Linux creator Linus Torvalds...
View ArticleData Breach Against Ashley Madison Is A Crime, Morals Aside
NEWS ANALYSIS: Regardless of where you live, there are always laws protecting victims from being further victimized, and no one should profit from the proceeds of crime. Adult infidelity Website Ashley...
View ArticleMicrosoft Patches Critical IE Flaw Affecting Windows
Internet Explorer may have taken a back seat to Microsoft Edge, but the browser is still a source of security concerns for several versions of Windows. Microsoft released a critical, out-of-band...
View ArticleLinuxCon: Core Infrastructure Initiative Boosts Security Efforts
VIDEO: The head of the Linux Foundation's security program details a new initiative to help projects develop and to identify secure best practices. SEATTLE—How does anyone know if any given open-source...
View ArticleThe Real Security Rules That Applied to Hillary Clinton’s Email Server
NEWS ANALYSIS: There's been a lot of conflicting claims from all sides about whether former Secretary of State Hillary Clinton improperly handled classified government email. Read on to learn what the...
View Article