Security News & Reviews

More Security News

1088_CollabEraseShadow

How Good Collaboration Software Can Help Erase Shadow IT SLIDESHOW

|
Employees will turn to risky shadow IT solutions if their collaboration technology isn’t easy to use. The right collaboration technology will balance security with ease of use.
Google.sign

Google Downplays Report On Android Location Data Collection

|
Company says data was collected as part of a heartbeat function to maintain connectivity but never actually used.
Microsoft

Microsoft Warns of Late-Year Spike in Office Threats

|
Online attackers are using recent Office exploits and increasingly sophisticated methods to infect PCs, warns the software giant.
AWS.GovCloud

AWS Secret Region Debuts as a Cloud for U.S. Intelligence Community

|
The new cloud region expands availability for the U.S. Intelligence Community by providing access for secret-level clearance usage.
Daily Tech Briefing Nov. 21, 2017

China Delaying Release of Critical Vulnerability Reports, Analysis Finds VIDEO

|
DAILY VIDEO: Data shows China likely delaying vulnerability reports to help attacks; Workday HCM will modernize HR portals with a smarter employee experience; Google announces an enterprise version of its Dialogflow chatbot API; and there's more.
Vulnerabilities

Intel Patches Management Engine for Critical Vulnerabilities

|
Security researchers discover flaws in Intel's Management Engine that could enable attackers to run unsigned code.
Insider.threat

Research: Half of Enterprises Suffered Insider Attacks in Last 12 Months

|
Survey is based on a comprehensive online survey of 472 cybersecurity professionals, which provides deep insight into current security trends.
IoT Toy Security Risk

Consumers Want IoT Toys Regardless of Security, Survey Finds

|
As the holiday shopping season gets underway, many consumers will pick up new internet of things devices, even though many of those devices might represent security risks.
North Korea Hacker Groups

North Korea-Backed Lazarus Group Takes Aim at Android Security

|
McAfee discovers new mobile malware that is linked to the same group that was behind the attack on Sony Pictures and the recent WannaCry ransomware worm.
Protecking Networks from North Koreans

Five Steps to Keep North Korean Hackers Out of Your Network

|
NEWS ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can keep them from getting the data they want.
Daily Video 1117

Some States to Start Auditing Election Results to Check for Vote Fraud VIDEO

|
DAILY VIDEO: States starting to implement audits to bolster election integrity; North Korea getting ready wage a global cyber war, Experts Say; Google Job Search results now include salary data or estimates; and there's more.
security flaws

Data Shows China Likely Delaying Vulnerability Reports to Help Attacks

|
While China’s national vulnerability database publishes details of security issues faster than its U.S. counterpart, the cases where it is slower suggest that authorities are delaying publication of vulnerabilities useful for exploiting adversaries’ systems, an analysis finds.
Armis CEO

Armis CTO Details Business Impact of BlueBorne Security Risks VIDEO

|
VIDEO: Nadir Izrael, co-founder and CTO of Armis Security discusses the expanding impact of the BlueBorne bluetooth security vulnerability that his firm discovered.

Enterprise Tech Videos