Zero-Day Exploits Doubled in 2015, Symantec Finds
In its annual Internet Security Threat Report, Symantec reveals that attackers exploited 54 zero-day vulnerabilities in 2015, more than doubling the previous year's total. The number of zero-day...
View ArticleLinux-fight! Dev’s plan to bundle kernel patches sparks debate
Sasha Levin kicks off 'security tree' side project Linux developer Sasha Levin has kicked off a project in which he proposes gathering up kernel security fixes under a single tree. The rationale behind...
View ArticleDon't let Badlock distract you from real vulnerabilities
System administrators who'd spent the past three weeks on high alert over a mysterious Samba vulnerability can stand down. Not only did Badlock turn out to be a marketing ploy to drum up interest in a...
View ArticleCRN Exclusive: Blue Coat Systems Expands Cloud Security Ecosystem With New...
Blue Coat Systems is continuing its transformation into a cloud security player with the launch of a new Cloud Ready Partner Program to bring more solutions into its ecosystem for partners. The new...
View ArticleEU data watchdogs: Privacy Shield needs fixes
Isabelle Falque-Pierrotin, chairman of the Article 29 Working Party.Exceptions in the proposed EU-US Privacy Shield framework that would allow the US to carry out mass surveillance of EU citizens are...
View ArticleCutting edge security: Expensive kit won’t save you
Stop wading through alerts and get serious We all want to protect our customer and employee data, but as the threat landscape changes and the publicly disclosed data breaches get increasingly larger,...
View ArticleFBI paid “gray hats” for zero-day exploit that unlocked seized iPhone
zodmanApple's encryption battle Apple won’t demand to learn how FBI cracked terror suspect’s phone US government still pursuing court order to unlock iPhone in New York case Report: “Deeply divided”...
View ArticleHouse bill would require warrants for data stored in the cloud
A U.S. House of Representatives committee has advanced a bill to give email and cloud-stored data new privacy protections from law enforcement searches. The House Judiciary Committee on Wednesday voted...
View ArticleUS House Committee approves bill requiring warrants for e-mail
Video of the House Judiciary Committee’s hearing on Wednesday. The US House Judiciary Committee on Wednesday approved legislation requiring that the authorities get a court warrant to obtain e-mail...
View ArticleFacebook Account Kit opens door to a world without passwords
Facebook takes a step closer to a world where we don’t have to remember passwords. With the new Account Kit SDK, app developers and site owners can let users log in without passwords. Account Kit,...
View Article0-day exploits more than double as attackers prevail in security arms race
Enlarge / The number of zero days showed their sharpest rise ever in 2015, reaching a record 54.Symantec The number of attacks that exploited previously unknown software vulnerabilities more than...
View ArticleSenators release official draft of federal encryption legislation
The first proposed federal encryption legislation has been released, and had it been established law earlier this year Apple would have had to provide the help the FBI asked for in accessing encrypted...
View ArticleJournalist sentenced to 24 months in prison after hacking-related conviction
Matthew Keys talks to reporters after he was sentenced to two years in prison on Wednesday.Cyrus Farivar SACRAMENTO, Calif.—A federal judge sentenced journalist Matthew Keys to two years in prison...
View ArticleOptiv Buys Advancive for Identity and Access Management Services
The deal enables Optiv to enhance its IAM expertise. Optiv aims to help organizations figure out a plan to solve IAM challenges and reduce security risks. In February 2015, security vendors Accuvant...
View ArticleReport: FBI Hired Hackers to Crack Shooter's iPhone
Reports said the feds used Israeli firm Cellebrite to unlock the phone, but the Post dismissed those claims. The FBI reportedly employed professional hackers to help crack a San Bernardino terrorist's...
View ArticleTraffic Studies Reveal Complex Picture of Tor's Role on 'Dark Web'
CloudFlare finds that 94 percent of the requests coming from Tor network are automated malicious communications, but that does not tell the whole story. For a week in March, Website security firm...
View ArticleHackers hacking hackers to knacker white hat cracker trackers
'These Russians speak really good Farsi' and other signs thieves lack honour ACSC2016 Malware writers are selling each other out to white hats and hacking through each other's infrastructure to frame...
View ArticleThe Best Security Suites for 2016
While Apple and the FBI wrangle over cracking terrorist-owned smartphones, you may figure that your own online activities are just not interesting to cyber-crooks. Nobody's begging the NSA to crack...
View ArticleWoman charged with live-streaming teen’s rape on Periscope
Marina Lonina was indicted on accusations that she Periscoped her boyfriend, Raymond Gates, raping a minor girl.Franklin County Sheriff An Ohio woman has been indicted on accusations that she...
View ArticleNew IT Asset Management Suite Combines Hardware and Software Management with...
Within Suite, LANDESK Introduces Asset Intelligence, Bringing Powerful Asset Discovery and Reclamation CapabilitiesBRACKNELL, UNITED KINGDOM— April 14, 2016 - LANDESK today announced it has released...
View Article