security: Vulnerabilities and threats
Two-factor authentication is a good step. But for securing many sites, Twitter included, it's not enough.
FTC should crack down on wireless carriers and smartphone manufacturers that put their customers at risk by failing to update Android devices.
Video surveillance played a key role in identifying the suspects in Monday's tragic Boston Marathon bombing, setting a precedent for increasing...
What should your company take away from this week's attacks? Lock down unsecured DNS repeaters being exploited by attackers and prep DDoS response...
Three-year old "TeamSpy" espionage campaign should be a wake-up call. Lock down your remote-access tools, or else.
Evernote used the wrong security method to store passwords, cryptography experts say. Unfortunately, it's a common error.
Passwords keep proliferating, but do new technologies and approaches offer an alternative? Maybe.
Today's security software wastes valuable time by delivering data dumps, rather than focusing on trends. But you can create your own visualizations.
Focus on the sorry state of your information security defenses before worrying about the Chinese, Russians, hacktivists or cybercrime gangs.
Security Newsletter Sign Up
Get timely, actionable insights tailored to the topics you are interested in.Sign Up
May 23, 2013
Bipartisan report argues that businesses should be allowed to retrieve stolen intellectual property from attackers' networks.
May 23, 2013
Authentication measure comes in wake of Syrian Electronic Army account hacks, further security steps coming.
May 22, 2013
Why do bad breaches happen to good companies? Here's a look at the most frequent causes.
May 21, 2013
Guantanamo Bay Naval Base authorities turn off Wi-Fi and social media after Anonymous threatened to shut them down.
May 21, 2013
Multi-year hacking campaign targeted mining companies, legal firms, Pakistan, Angolan dissidents and others in Pakistan, the U.S., Iran, China and...
May 20, 2013
Yahoo breach could have compromised 10% of all Yahoo user credentials. Meanwhile, Syrian Electronic Army targets The Financial Times.
May 17, 2013
Syrian hackers claim to battle American imperialism, media bias and Angelina Jolie.
May 16, 2013
DHS proposal would give private businesses access to the government's stockpile of zero-day secrets for a fee. But some say the program may...
May 14, 2013
Avoid these common "tunnel vision" mistakes when investigating a breach or hack.
May 13, 2013
Readers detail "frozen DNS Trojan" cold calls and "repairs" that lead to $882 in unauthorized wire transfers.
- Secure your mobile applications in the new commerce era - Mobile Commerce World - Mobile Commerce World
- Get practical information on how to develop your organization's mobile commerce application - Mobile Commerce World - Mobile Commerce World
- Get practical strategies to build a solid plan for profitability and success - Mobile Commerce World - Mobile Commerce World
- Learn how to best integrate mobile commerce with your current systems -- Mobile Commerce World - Mobile Commerce World
- Learn how to move your broadband service to an All-IP network at TelcoVision (formerly TelcoTV) - TelcoVision
- How Attackers Identify and Exploit Software and Network Vulnerabilities
- Get Actionable Insight with Security Intelligence for Mainframe Environments
- Getting a Grip on Mobile Malware
- Cloud Security: It’s Not Just for IT Anymore
- Strong Authentication: Transforming BYOD challenge to BYOD opportunity
This Week's Issue
Free Print SubscriptionSubscribe
Current Government Issue
- The Government CIO 25: These influential and accomplished government IT leaders are finding ways to be cost efficient and still innovate.
- Rethink Video Surveillance: It's not just about networked cameras anymore. New technology provides analytics, automation, facial recognition, real-time alerts and situational-awareness capabilities.
- Read the Current Issue