Resources related to information security, including news and opinion and more on software and application flaws and fixes, data breaches, the inside threat the latest hacker attacks.
Fri, March 07, 2014 - Research pointing to rising criminality on Tor shows the cost of having a network that provides anonymity to whistleblowers, journalists, political dissidents and others trying to avoid government surveillance.
Fri, March 07, 2014 - Researchers from North Carolina State University have found a way to monitor for Android malware with very low overhead
Fri, March 07, 2014 - Security has passed cloud services become the most important IT issue this year in Germany
Fri, March 07, 2014 - National spy agencies across Europe are allowing the NSA to piece together their data into a larger picture, Snowden said
Thu, March 06, 2014 - Microsoft today announced it will deliver five security updates to customers next week, two tagged as "critical," including one that will quash the open vulnerability in Internet Explorer (IE) that hackers have been exploiting since January.
Thu, March 06, 2014 - Security teams need to differentiate between inconsequential and damaging malware so resources aren't used to chase the wrong threat.
Thu, March 06, 2014 - Despite all of the attention it has received in the media, government hacking ranks low as a concern for security professionals.
Thu, March 06, 2014 - Privacy issues may cause a stumbling block for companies capitalizing on a growing stream of user data
Thu, March 06, 2014 - With some opening shots in a cyber component to the war of nerves in the Ukraine already fired, security analysts today pondered what a full-fledged cyberwar in the region would look like.
Thu, March 06, 2014 - The proposed deal raises concerns about WhatsApp users' privacy, two groups say
Thu, March 06, 2014 - ICSA Labs, an independent division of Verizon, is now one of the largest government-approved EHR testing and certification body. The organization has aspirations beyond meaningful use, though, and hopes to drive healthcare IT vendors toward interoperability and innovation.
Thu, March 06, 2014 - As if crowded train cars aren't creepy enough, a Massachusetts high court has ruled that so-called "upskirt" photos of a woman on a Boston trolley are legal, according to a strict reading of state law.
Thu, March 06, 2014 - The tool can be used to add malicious functionality to legitimate applications, researchers from Symantec said
Thu, March 06, 2014 - And without remote management, getting patches onto devices scattered throughout the organization is hit or miss.