Internet Security News, Articles and Updates

NSA blames storm for website outage

NSA blames storm for website outage

By

The National Security Agency (NSA) blamed a partial shutdown of NSA.gov on a storm that hit its headquarters earlier this week.

RSA 2016: Trust in the internet is imperative to sustain worker productivity

RSA 2016: Trust in the internet is imperative to sustain worker productivity

By

One of the more frightening possible result from the seemingly endless stream of hacks taking place is that they degrade public trust in the internet and this could lead to a serious fall off in worker productivity.

The  whole  package: Security certifications

The whole package: Security certifications

By

Security certifications can land you a better job, but companies are also looking for people who can communicate and manage projects, reports Steve Zurier.

Mozilla pushes internet security reform through study

By

The Cyber Security Delphi initiative will solicit input from security specialists and create an affirmative agenda to move internet security forward.

Google, Microsoft respond to fraudulent certificate

By

A Turkish certificate authority (CA) accidentally issued two intermediate, or chained, digital certificates, one of which was used by the holder to mimic legitimate websites and launch attacks.

Making sense of Middle East-targeted malware

Making sense of Middle East-targeted malware

Stuxnet kicked things off, and since then, there's been an explosion in sophisticated viruses targeting businesses and critical infrastructure in the Gulf region. But, prevention is still an option.

Authenticating new tech: Safeguarding mobile identities

Authenticating new tech: Safeguarding mobile identities

In the age of mobile, social and cloud, the so-called perimeter that businesses have been protecting for years is now dead.

Microsoft pushes two patches and new cert requirement

By

Experts said the light patch load addresses issues that aren't considered high-risk, but the monthly update from Microsoft also includes a new requirement that encryption algorithms on RSA certificates meet a certain key length.

Never trust a stranger: Secure social networking

Never trust a stranger: Secure social networking

The personally identifiable information found on social networks are a gateway for hackers to get access to the heart of the information they truly desire.

Microsoft, Adobe issue security updates for more than 50 bugs

By

Microsoft plugged 26 vulnerabilities, and Adobe shored up 26 of its own as part of a monster Patch Tuesday. Each company is grappling with an active exploit as well.

Canada's spy chief champions internet surveillance

By

The head of the Canadian Security Intelligence Service (CSIS) offered the agency's assistance to Public Safety Minister Vic Toews to make the government's controversial internet surveillance bill more palatable.

Threat of the month: MS zero-day

Threat of the month: MS zero-day

The threat of the month for August is the MS zero-day.

Pervasive protection: Endpoint security

Pervasive protection: Endpoint security

By

Endpoint security today is responding to the needs of the enterprise in ways it has not in the past, says Technology Editor Peter Stephenson.

Patch Tuesday: Microsoft pushes nine fixes for 16 flaws

By

In addition to 15 other vulnerabilities, Microsoft plugged a gaping Core XML Services hole that was being used in active exploits being foisted through Internet Explorer.

Phishing remains most reliable cyber fraud mechanism

By

Criminals continue to lean on trusted brands to dupe victims out of their personal and financial information, and they are getting smarter in their strategies and techniques, said a Kaspersky Lab researcher.

Guarding the crown jewels: Critical data

Guarding the crown jewels: Critical data

The loss of personally identifiable information (PII) by an organization can lead to customer loss, reputational harm, and fines, but before this data can be properly guarded, it must be located.

Stupid is as stupid does

Stupid is as stupid does

When it comes to the causes of data breaches in health care, don't forget human goof-ups.

Hackers having less success in draining bank accounts

By

Financially minded cyber criminals are attempting to hijack corporate bank accounts at increasing rates, but they are finding less luck in actually getting money out of them, a new study shows.

Auto dealer, debt collector settle with FTC over data breaches

By

The Federal Trade Commission has settled with two companies over allegations that they leaked sensitive data of individuals via file-sharing networks.

Spy virus Flame got help from doctored Microsoft certificates

By

Illegitimately signed Microsoft certificates were used to help spread the nefarious Flame malware, another sign detailing just how sophisticated the espionage toolkit is.

Think identity theft can't happen to you? Think Again

Think identity theft can't happen to you? Think Again

With fraud complaints more than doubling over the past five years, protecting private information is more critical than ever for those who rely on the internet for communicating personal and financial data.

Data on 700K California home care workers, recipients lost

By

The personal information of home care workers and their elderly and disabled recipients may have been compromised when the storage device on which it was contained was lost in the mail.

Facebook users experience two-hour blackout

By

Facebook users in Europe experienced a two-hour blackout that the company describes as "technical difficulties."

Four-month extension request approved in DNSChanger case

By

A federal judge has approved a request to extend the use of DNS servers, giving enterprises more time to remove the insidious DNSChanger trojan.

Towards a safer internet

Child safety is a hot topic right now, but then it's always important.

FBI wraps up 2011 with 30 more cyber crime indictments

Recent prosecuted cases tackle long-running internet-based scams

GlobalSign says web server, not CA systems, hit by breach

By

GlobalSign, which briefly halted operations in September out of concern that it was the latest SSL certificate authority hacked, has determined that its CA infrastructure was never compromised.

Industry group creates guidelines for issuing SSL certs

By

New standards, set to go into effect July 1, 2012, are based on best practices across the SSL/TLS sector. But some researchers, who have called for an overhaul of a system they say is antiquated, don't think standards will help.

Perimeter defense

By

Being able to address problems at the application layer is a key aspect of protecting the ever-fading perimeter in the enterprise of the future.

In the vault: The Coastal Bank and IronKey

In the vault: The Coastal Bank and IronKey

By

A Georgia bank found a tool to protect financial transactions and payments...while meeting compliance demands, reports Greg Masters.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US