Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

Hacking an aircraft: is it already real?

In-flight security made quite a lot of headlines earlier this summer, but this time at unusual angle. Aviation has always been focused on safety and had remained the most secure industry that ever...

View Article


Linux Foundation’s security checklist can help sysadmins harden workstations

If you’re a Linux user, especially a systems administrator, the Linux Foundation has some security tips to share with you, and they’re quite good. Konstantin Ryabitsev, the Foundation’s director of...

View Article


McAfee Labs quarterly report reviews five-year threat retrospective

#intel has released its #mcafee Labs quarterly threat report revealing the key cyber-attack developments from the second quarter of 2015. The report provides a recollection of #threats from the last...

View Article

Bitcoin community ‘needs to collaborate’ over security and scalability

The Bitcoin community has been urged by some of its most prominent members to do more to achieve “technical consensus” over security and scalability. More than 30 developers and contributors involved...

View Article

Which chat service should your business use? Different messaging services go...

Instant messaging services have become an essential part of our lives. Not only do we constantly use them to keep in touch with friends and family, but also to chat with work colleagues about business...

View Article


Security Week 36: jailbreak theft, farewell to RC4 and holes in routers

In simple words, the brand new #iphone 164 will know everything about you. #google, which will have lived through 34 re-branding campaigns and 8 restructuring efforts, will store and process this data...

View Article

IFA 2015: security all the go

The new trend on IFA 2015 — a trade-show for consumer #electronics — is all about innovations in technological integrity. Developers chase after hardware superiority no more; instead they are making...

View Article

Russian spy gang hijacking satellite links to pilfer data

Researchers from Kaspersky Labs disclosed this morning that advanced threat actors have found an insidious solution for the constant seizure and takedown of their domains and command-and-control...

View Article


My NSA security violation

About a year after I started at the National Security Agency, I suffered the embarrassment of being caught violating #nsa #security procedures. I was totally guilty and it was quite humiliating, as you...

View Article


Obama calls out China over cyberattacks

President #obama had blunt words for #china on Friday, weeks ahead of a visit to the U.S. by the Chinese president. Asked about #cyber threats during a town hall with U.S. troops, the president noted...

View Article

Week in review: Android ransomware multiplies, FireEye censors researcher

#hacker had access to sensitive info about #firefox bugs for over a year Mozilla has announced that an attacker managed to access #security-sensitive information about a considerable number of (at the...

View Article

Industrial security awareness continues to remain low

While traditional #manufacturing industries were not designed with security in mind, the proliferation of networks and devices, disparate communication channels, and the use of off-the-shelf software...

View Article

Keystroke profiling

Also known as keystroke or typing dynamics, keystroke profiling translates into associating an individual with his/hers way of interacting with an interface via a keyboard or another device of input....

View Article


7 security and privacy concerns at the polls

A recent #poll by Wakefield Research delved into the psyche of the American voter asking them many questions about who will lead them through cyberspace the next four years. According to the survey,...

View Article

Cyber risk still poorly communicated to C-suite executives

#cyber risk continues to be poorly communicated to C-suite executives, according to #auriga consulting. The monopolization of the risk management function by IT and security consultants and poor...

View Article


Bypass Developed for Microsoft Memory Protection, Control Flow Guard

Introduced in #windows 8.1 Update 3 and Windows 10, #control flow guard was #microsoft’s latest antidote to #memory-corruption #attacks. The technology was meant to stand up to attacks that had long...

View Article

CSO Survival Guide: Securing DevOps

In the past few years, #devops has moved from a niche approach to application development to an #enterprise #strategy that stands front and center in organizations today. And the move to DevOps is...

View Article


Xi: ‘China is ready’ for cyber crime dialogue

Chinese President #xi jinping is prepared to start a “high-level” cyber-security #dialogue with the United States. “China is ready to set up a high-level joint dialogue mechanism with the United States...

View Article

NIST will award $3.6 million to projects designed to improve cybersecurity

The U.S. #department of commerce‘s National Institute of Standards and Technology (#nist) will award $3.6 million for three #pilot projects designed to make #online transactions more secure and...

View Article

4 IoT Cybersecurity Issues You Never Thought About

Call it a physical and cyber-security #challenge. Innovators and industry experts in Boston Tuesday for the #iot Security 2015 conference brainstormed about some of the Internet of Thing’s most...

View Article
Browsing all 2490 articles
Browse latest View live