Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

72% of companies are not prepared for a data breach

EiQ Networks conducted a survey on information security priorities and challenges. Based on responses from 168 IT decision makers across industries, results point to lack of confidence in their...

View Article


Cyber attacks aren`t just targeting big business

81% of small business owners believe cyber security is a concern for their business, with 94% stating they frequently or occasionally think about cyber security issues. The Endurance survey also found...

View Article


Apple security program, MacKeeper, celebrates difficult birthday

MacKeeper, a utility and #security program for #apple computers, celebrated its fifth birthday in April. But its gift to U.S. consumers who bought the application may be a slice of a $2 million...

View Article

Electronic lock maker clashes with security firm over software flaws

The maker of a widely used electronic lock has taken issue with a #security company’s criticism of one of its flagship products. #ioactive, a Seattle-based security consultancy, published anadvisory...

View Article

Windows 10 spells the end of Patch Tuesday

Microsoft is ready to abandon the longstanding patching schedule that saw patches and security updates being delivered on the second Tuesday of every month. With the advent of Windows 10, security...

View Article


Lenovo Patches Vulnerabilities in System Update Service

Still reeling from the Superfish vulnerability, three more serious vulnerabilities have been patched and disclosed in #lenovo’s update system for its PCs. Researchers at IOActive yesterday disclosed...

View Article

Attackers exploit vulnerabilities in two WordPress plugins

A vulnerability within two widely used #wordpress plugins is already being exploited by hackers, putting millions of WordPress sites at #risk, according to a computer #security firm. The plugins are...

View Article

Companies are falling behind on securing their SAP environments

More than 95 percent of #sap systems deployed in enterprises are exposed to #vulnerabilities that could lead to a full compromise of business #data, a #security firm claims. Onapsis, a Boston-based...

View Article


With Lock Research, Another Battle Brews in the War Over Security Holes

IN THE LATEST sign that the war between security researchers and the companies they investigate is heating back up, researchers who uncovered vulnerabilities in a brand of high-security electronic...

View Article


The Internet of Things to take a beating in DefCon hacking contest

Hackers will put Internet-connected embedded devices to the test at the DefCon 23 #security conference in August. Judging by the results of previous Internet-of-Things security reviews, prepare for...

View Article

BrandPost: Five Questions CIOs Should Ask When Managing An IT Disaster...

Lately, we have often depicted CIOs as parachuting down to earth, with dubious levels of safety. But despite our potential overuse of this metaphor, I think it’s still apt, especially when describing...

View Article

Hacked advertising platform sent users to the Nuclear exploit kit

A suspected #malicious advertising #attack turned out to be a much deeper compromise of an online advertising company, according to Trend Micro. The #security company found that advertisements served...

View Article

New Linux rootkit leverages GPUs for stealth

A team of developers has created a rootkit for #linux systems that uses the processing power and memory of graphics cards instead of CPUs in order to remain hidden. The rootkit, called Jellyfish, is a...

View Article


Proof-of-concept rootkit proves malware can hide on graphics chips

A team of anonymous developers who recently created a Linux rootkit that runs on graphics cards has released a new proof-of-concept malware program that does the same on Windows. A Mac OS X...

View Article

Beware the ticking Internet of Things security time bomb

IBM’s Andy Thurai didn’t quite put the words into former RSA CTO Deepak Taneja’s mouth, but did prompt him by asking at the start of a TIE Startup Con panel in Cambridge, Mass., earlier this month...

View Article


Increasing cloud adoption will drive IT innovation

DevOps is a software development and IT management method that brings software engineering, quality assurance, and IT operations together as an integrated team to collaboratively manage the full...

View Article

Add GitHub dorking to list of security concerns

One of the big lessons that we’ve learned in the last ten years is that even little pieces of once disparate data, gathered in a single location, can yield startling truths. With #facebook, that lesson...

View Article


The best way to protect passwords may be creating fake ones

#password managers are a great way to supply random, unique passwords to a high number of websites. But most still have an Achilles’ heel: Usually, a single master password unlocks the entire vault....

View Article

Free tool reveals mobile apps sending unencrypted data

A surprising amount of #mobile #data still crosses the Internet unencrypted, and a new free app is designed to show users what isn’t protected. The program, called Datapp, comes from the University of...

View Article

Venom vulnerability bares its fangs: Protect your data center with these patches

A critical vulnerability called Venom (Virtualized Environment Neglected Operations Manipulation) has been discovered by Jason Geffner at the #security firm CrowdStrike. The vulnerability is in a...

View Article
Browsing all 2490 articles
Browse latest View live