Intel Security launches new McAfee lineup harnessing the power of the cloud
As we use more devices to access the internet protecting all of them from the latest threats becomes something of a chore. Intel Security is addressing this with the launch of a new 2017 range of...
View Article10 IT Conferences to Advance Your Career
Conferences offer wonderful opportunities for education and networking, but even the best can be expensive and time consuming. And there’s nothing worse than being stuck in a drafty business center...
View ArticleWalter Isaacson: The internet needs 'rules of the road'
David Orrell | CNBC Walter Isaacson Walter Isaacson, CEO of the Washington-based Aspen Institute think tank, has long been looking for a virtual "clean slate." In light of the Cambridge Cyber Summit ,...
View ArticleIDG Contributor Network: Will a focus on data protection save the day?
Ron Faith, President and CEO of Datacastle , and I had an interesting conversation about security and data protection. We both agreed that it is surprising, but still true, that many enterprises still...
View ArticleEndpoint Security that Doesn’t Slow Down Your Computer
Installing new software impacts the speed and performance of your machine. Endpoint security is often criticized for being a culprit. Bromium software not only offers amazing protection but can also...
View ArticleA Behavioral Biometric Keystroke Recognition
Overview of the Last Article In our articles on Biometrics, we have covered a wide range of topics, ranging from examining the Physical-based Biometrics, to Multimodal Solutions, to implementing a...
View ArticleNexus 9 LTE is now receiving official Android 7.0 Nougat with September 6th...
Like the Nexus 6, the Nexus 9 LTE didn't receive Nougat when most other Google devices did; however, since the Nexus 9 LTE sold significantly fewer units than the Nexus 6, there wasn't much outcry.Not...
View Article公安部放大招:身份证报失后立即失效 无法再用!
身份证关系到每个公民的信息安全,从办理银行卡到注册网购账户,每一个环节都有身份证的身影。这意味着,如果一个人的身份证信息被他人窃取或者是复制,那么个人信息将面临巨大威胁。 现在,公安部已经开始从根本上封堵身份证信息泄露给个人信息安全带来的隐患。 公安部打四黑除四害官方微博最新发布消息,...
View ArticleSymantec Selects VMware AirWatch to Build Enhanced Endpoint Security...
Symantec and VMware Will Deliver an Integrated Approach to Mobile Threat Defense and Remediation Today at Connect 2016, Symantec a global leader in cyber security, and VMware(NYSE: VMW) a global leader...
View ArticleYahoo security breach highlights the importance of personal protection
The recent breach at Yahoo has proved once again that, regardless of a company’s size and expertise, security is always an issue. In the wake of the incident which left Yahoo bosses scratching their...
View ArticleCan we get to a more secure desktop? A tour of all the new Microsoft security...
Can you get to a more secure computing platform than this? Microsoft would like you to. Really, they would. In the Anniversary Update to windows 10 (aka build 1607) they added more capabilities for you...
View ArticleYahoo! tries! to! shoot! down! email! backdoor! claim! 24! hours! after!...
Almost 24 hours after refusing to deny allegations that it allowed US intelligence free reign on its email systems, Yahoo ! has issued a carefully worded non-denial. "The article is misleading," the...
View ArticleMalwareGone Threat Analysis MulCiShell Backdoor and File Uploader Part I
For this installment, we’ll talk about a webshell called “MulCiShell”, more specifically the “MulCiShell v0.2” backdoor file, which is a php Web Shell that we found in another client’s website using...
View ArticleRouters, IP Cameras/Phones & IoT Devices can be Security Risks even with...
I’ve just read an interesting article entitled “ who makes the IoT things under attack “, explaining that devices connected to the Internet such as router, IP cameras, IP Phones, etc.. may be used by...
View ArticleA closer look at data breach preparedness
While most organizations have a data breach preparedness plan in place, executives are not updating or practicing the plan regularly and lack confidence in its effectiveness, according to a study by...
View ArticleSecurity fatigue is real we need usable security
A preliminary study involving 40 computer users of different ages, occupations, and living in different settings has shown what most of use already know to be true: security fatigue is a real thing....
View ArticleUsing DNS Names in Firewall Rulesets
My friend Matthias Luft sent me an interesting tweet a while ago: @ioshints What’s your take on firewall rule sets & IP addresses vs. hostnames? ― Matthias Luft (@uchi_mata) August 16, 2016 All I...
View ArticleSecurity Think Tank: Three-pronged approach to phishing prevention
Phishing is one of the most successful and commonly used attack vectors we face, and this is because it involves people. I’ve said it before and I’ve read it many times over, but people are always...
View ArticleThe service desk as an attack vector
“So you work in service desk? Must be soul-killing to ask people to turn their computers off and on again all day”. This, or a variation, is by far the most common reaction I’ve had when I told people...
View ArticleSIBOS 2016 Protect customer, reduce risk and simplify core
ByAbhishek Chatterjee for Finextra Last year SIBOS was an inflection point for transaction bankers and FinTech, but this year in Geneva we saw a very measured response to key Industry challenges faced...
View Article