Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

The need for information security innovation

The increasing number of connected devices is multiplying the probability of #cyberattacks on companies across sectors. This is compelling organizations to adopt cybersecurity solutions in order to...

View Article


Polymorphic security warnings more effective than same, static ones

In the last year or so, we have witnessed Google becoming increasingly interested in providing effective warnings that would spur users into making good decisions regarding the security of their...

View Article


OpenSSL fixes serious denial-of-service bug, 11 other flaws

The mystery high-severity flaw that people were expected to be fixed in #openssl is no Heartbleed, but it is serious and users should update. Earlier this week, the OpenSSL Project advised users that...

View Article

CISA Security Bill: An F for Security But an A+ for Spying

  WHEN THE SENATE Intelligence Committee passed the Cybersecurity Information Sharing Act by a vote of 14 to 1, committee chairman Senator Richard Burr argued that it successfully balanced security and...

View Article

Stealing Data From Computers Using Heat

  AIR-GAPPED SYSTEMS, WHICH are isolated from the #internet and are not connected to other systems that are connected to the Internet, are used in situations that demand high security because they make...

View Article


Apple quietly pulls anti-virus apps from App Store in negativity crackdown

#apple has pulled an unknown number of #mobile #security #apps from the iOS App Store as part of a new policy that takes exception to the ‘anti-virus’ and anti-malware’ software categories, Mac...

View Article

BrandPost: The #1 Information Security Policy That IT Managers Would Change

There are a lot of frustrated IT managers out there. How do I know? Because a recent survey commissioned by Sungard Availability Services* revealed that the 1 thing IT managers said they would do if...

View Article

Four advantages of an identity behavior-based approach to cybersecurity

With an ever-increasing number of data breaches, more money is being poured into IT security budgets. According to Gartner, the average global security budget increased 8 percent from 2013 to 2014 and...

View Article


Dell support tool put PCs at risk of malware infection

Attackers could have remotely installed #malware on systems running a flawed #dell support tool used to detect customers’ products. A #security researcher discovered the flaw in November and reported...

View Article


Security best practices for users is your first line of defense

Most CIOs are on top of their game when it comes to securing networks, encrypting sensitive data and keeping private customer information safe – chances are, you’re one of those. But there’s a glaring...

View Article

Researcher finds backdoor opened by Dell`s helper app

A security researcher has discovered a serious bug in Dell System Detect, the software Dell users are urged to use to download the appropriate drivers for their machines. The flaw can be exploited by...

View Article

Zero day, Web browser vulnerabilities spike in 2014

The number of zero-day and Web browser vulnerabilities shot up in 2014, but overall software vendors are patching faster. The data comes from Secunia, a Danish security vendor that releases an annual...

View Article

Data lurking: How to protect your company against overlooked insider threats

Enterprises often fear hackers as their number one security threat. However, they should be more scared of what happens internally. More often than not, data breaches come from employees or system...

View Article


An SDN vulnerability forced OpenDaylight to focus on security

Open-source software projects are often well intended, but #security can take a back seat to making the code work. OpenDaylight, the multivendor software-defined networking (SDN) project, learned that...

View Article

Hundreds of Android and iOS apps are still vulnerable to FREAK attacks

Hundreds of #android and #ios apps are still vulnerable to a dangerous #attack revealed two weeks ago that can compromise encrypted data, a #security vendor said Tuesday. The apps have not yet been...

View Article


Microsoft and friends get Lenovo’s Superfish scourge under control

Microsoft says the Superfish adware that potentially exposed thousands of #lenovo PCs to man-in-the-middle attacks is well under control. To battle the Superfish #scourge, microsoft added automated...

View Article

The state of open source security

If there’s a poster child for the challenges facing open source security, it may be Werner Koch, the German developer who wrote and for the last 18 years has toiled to maintain Gnu Privacy Guard...

View Article


BrandPost: Top Five Security Risks with Windows Server 2003 EOL

Remember when #windows server 2003 debuted? A highlight that had us all excited were the advances in IT #security built in by design. We’re talking about a re-engineered Internet Information Services...

View Article

How companies are securing their cloud data

As companies accelerate their adoption of the cloud, the cloud data footprint is expected to grow to 6.5 zettabytes by 2018. This rapid migration of data into the cloud creates the need for insight...

View Article

Most enterprise network teams now deal with security investigations

85 percent of enterprise network teams today are now involved with security investigations, indicating a major shift in the role of those teams within enterprises, according to Network Instruments....

View Article
Browsing all 2490 articles
Browse latest View live