security: Application Security
S.C. Security Blunders Show Why States Get Hacked
Governor blames data breach on Russian hackers and the IRS, but states' by-the-book IT ethos shows rules and regulations are the real culprit.
Royal Security Fail: 'May I Speak To Kate?'
The oldest -- and most effective -- social engineering trick in the book remains getting on the phone and impersonating an insider. Ask Kate...
Social Networks Continue Push For Control
The Internet was supposed to facilitate direct connections between individuals and disempower gatekeepers. Instead, it has become a massive...
Should LulzSec Suspect Face Life In Prison?
Computer hacking, identity theft, and fraudulent credit card charges could add up to 30 years to life for alleged Stratfor hacker Jeremy Hammond.
Facebook 'Privacy Notice' Has No Legs
But Facebook should be looking at why the notice went viral.
Petraeus Mission Impossible: Cloaking Email, Online Identities
So-called security experts making basic information security errors isn't a new occurrence. Arguably, it even led to the rise of the Anonymous...
The Petraeus Affair: Surveillance State Stopper?
Lawmakers, now reminded of their own vulnerability, need to strengthen email privacy protections. Companies need to do more to help customers...
5 Items Should Top Obama's Technology Agenda
From infrastructure to tech education, here's what I want to see on the to-do list for the next four years.
5 Emerging Enterprise Technologies
If you are not watching these developments, your business is missing out. Here's what Gartner's annual top 10 tech trends list missed.
Frankenstory: Attack Of The Iranian Cyber Warriors
Citing no hard evidence, U.S. government officials have been stoking fears that the Iranians are out to get us.
Security Newsletter Sign Up
Get timely, actionable insights tailored to the topics you are interested in.
Sign UpTop Stories
-
Rethinking IT Security Architecture
December 28, 2012Experts question the wisdom of current 'layered' cyberdefense strategies as attacks become more sophisticated and breaches abound.
-
10 Biggest Information Security Stories Of 2012
December 28, 2012From John McAfee's escape from Belize to the privacy debacle that compromised CIA director Petraeus' career, 2012 had no shortage of security...
-
Windows 8 Security Stresses Exploit Prevention
December 27, 2012Here's a look at some of the key security features in the Microsoft's new OS.
-
7 Top Information Security Trends For 2013
December 27, 2012From sandboxing enterprise apps on mobile devices to hacking websites via high-bandwidth cloud attacks, experts detail the security trends they...
-
Forensic Tool Cracks BitLocker, PGP, TrueCrypt Containers
December 20, 2012ElcomSoft's Forensic Disk Decryptor uses PC memory dumps to crack passwords associated with BitLocker, PGP and TrueCrypt archives.
-
Attack Turns Android Devices Into Spam-Spewing Botnets
December 19, 2012Beware Trojan app sending 500,000 spam SMS messages per day, charging messages to smartphone owners.
-
Could A Thumb Drive Stop Stuxnet?
December 12, 2012Kingston launches USB thumb drives with built-in ESET antivirus software to eliminate viruses, Trojan applications, rootkits, and worms.
-
10 Security Startups To Watch In 2013
December 12, 2012Convergence of two strong business trends -- security services and cloud services -- made 2012 a good year for startups combining aspects of both...
-
New Rules For Bug Hunters In 2013
December 04, 2012Zero-day vulnerabilities market becoming more guarded as researchers increasingly limit public disclosure of their findings.
-
Better Security Through Data Mining
December 04, 2012Mining access logs and identity stores can provide a good picture of what's going on inside the firewall.
More
News »
Slideshows
Resource Links
Related Webcasts
- Is Your Network Ready for BYOD?
- Storage Encryption Options for Better Security
- Endpoint Insecurity: How to Close Ranks Among Your Employees -- And Close The Gaps For Device-Related Data Breaches
- Getting a Fix On Your Security Posture: What Your Logs Aren't Telling You
- Outsourcing Security: What Every Potential Cloud Security Customer Should Know
This Week's Issue
Free Print Subscription
SubscribeCurrent Government Issue
- Data Center Optimization: Federal agencies must increase server utilization and energy efficiency as they squeeze more computer processing into fewer data centers. We explore how the Army, Homeland Security, Veterans Affairs and others are doing that.
- Future Cities: The world's urban centers are growing, creating a civic management challenge of unprecedented scope and complexity. Our exclusive survey reveals the opportunities and challenges for city planners and municipal IT pros.
- Read the Current Issue












