www.fgks.org   »   [go: up one dir, main page]

Security Channel

Network security news, reviews, and advice on malware defense, data security, hacker countermeasures, and security management.

Security Articles

Watch out for these 5 summer scams

Put your feet up and let your hair down -- but don't let these security scams ruin your holidays

Latest cyber security bill riddled with Net neutrality loopholes

Critics attack CISA's vague wording for providing a backdoor route for mounting attacks on Net neutrality and privacy

Critical vulnerability in WordPress newsletter plug-in endangers many blogs

Attackers could exploit a flaw in the MailPoet Newsletters plug-in to take full control of vulnerable blogs, researchers from Sucuri said

Microsoft action against No-IP disrupting other hacking groups, Kaspersky says

A variety of other sophisticated state-sponsored cyber espionage campaigns used No-IP's infrastructure

OpenSSL Project publishes roadmap to counter criticism

The project plans to implement code reviews, fix poor coding, and have better documentation

Microsoft admits to technical error in IP takeover, but No-IP still down

No-IP claims Microsoft doesn't appear to be very good at DNS

EFF sues the NSA to disclose use of software security flaws

The EFF filed suit seeks information about zero-day flaws the agency might be exploiting

Microsoft boosts anti-snooping protection in Outlook.com, OneDrive

The consumer webmail and cloud storage services will now be protected with new encryption

Microsoft to resume email-based security notifications

The next security notifications will go out Thursday ahead of monthly security patches

Energy providers hacked through malicious software updates

Symantec says the Dragonfly campaign, originating in Eastern Europe, sought to gain persistent access to energy suppliers

Security White Paper

Information Security and Multi-Compliance

It’s common for information security managers to be held responsible for situations where they have little control or... more

Security Blog entry

Let your worst fears be your guide

Your computer security defense should be built with the assumption that all attackers are trusted, highly privileged insiders... more

Security White Paper

ITCi White Paper: Challenges and...

The Payment Card Industry Data Security Standard (PCI DSS) provides an enterprise structure for improving operational, security,... more

Prepare yourself for high-stakes cyber ransom
SECURITY ADVISER
Prepare yourself for high-stakes cyber ransom

Blog by Roger A. Grimes

A cloud startup was obliterated overnight by malicious hackers demanding ransom. Now everyone is a target. Here's your best defense
Security Deep Dives
Digital Spotlight: Cloud Security:

In this Digital Spotlight on Cloud Computing, we tackle these challenges head-on, beginning with an examination of the "notorious nine"....

Download the 'How to Rethink Security' Deep Dive:

here is a pageThe bad guys are persistent, sophisticated, and they are making inroads. It is hard to be optimistic....

Download the Identity Management Deep Dive:

Identity management is no laughing matter. Yet a simple glance at today's headlines recounting innumerable hack attacks and data spills....

©1994-2014 Infoworld, Inc.