Security News & Reviews - Page 4

More Security News


Google Removes Three Fake Bitcoin Wallet Apps From Google Play

A security firm discovers that fake cryptocurrency wallets got into the Google Play store. How can users avoid the fraud and keep their Bitcoin where it belongs?

Twitter Expands Two-Factor Authentication Security Options

Twitter now supports the use of third-party two-factor authentication tools including Google Authenticator, Authy and Duo Mobile.

New Survey Finds 10 Percent Failure Rate in Email Security Systems

NEWS ANALYSIS: Security firm Cyren tested millions of real-world emails to find out how well email filtering software and appliances worked, and found that many of them didn’t.
Daily Tech Briefing Dec. 20, 2017

Thales Buys Gemalto for $5.6B to Advance Digital Security VIDEO

DAILY VIDEO: Thales acquires Gemalto for $5.6 billion to create a global security giant; a collaborative takedown kills the IoT worm "Satori"; Google will index and rank sites using mobile versions of their content; and there's more.
New Google Cloud DLP Features

Cloud Data Leak Exposes Information on 123 Million Americans

NEWS ANALYSIS: Yet another Amazon S3 cloud storage data leak is publicly disclosed. What can organizations do to eliminate the risk?

IT Science Case Study: How Chef Cooked Up Better Security

Chef is an innovative, fast-moving company that is driven by speed to market using a DevOps approach to engineering. It needed a better security system, and it found one.
WannaCry Ransomware

2017 Year in Review: Cyber-Security Faces Challenges Old and New

NEWS ANALYSIS: 2017 was another challenging year for cyber-security, with multiple high-profile data breaches and vulnerabilities disclosed.
Daily Tech Briefing Dec. 19, 2017

Hacker Uses TRITON Malware to Infiltrate Critical Infrastructure Sites VIDEO

DAILY VIDEO: TRITON attack targeted critical infrastructure, a security firm says; AMD racks up cloud server wins with Baidu and Microsoft; Amazon will resume sales of Google Chromecast video streaming devices; and there's more.
Homeland Security adviser Tom Bossert

U.S. Government Blames North Korea for WannaCry Ransomware Attack

In a White House press briefing, Homeland Security adviser Tom Bossert attributed the WannaCry ransomware attack to North Korea and explained why the U.S. government still holds on to approximately 10 percent of all the vulnerabilities it discovers.
IoT security

Collaborative Takedown Kills IoT Worm 'Satori'

In four days, security researchers and internet service providers cooperated to shut down a botnet spreading through compromised internet of things devices.
BlackBerry Ends PRIV Security Updates

BlackBerry Ends Security Updates for PRIV Smartphone

BlackBerry announced it is ending security updates for its PRIV smartphone and says it will close its app store in December, 2019 as the company continues its transition to marketing only mobile security software.
apache struts

How the Zealot Attack Uses Apache Struts Flaw to Mine Crypto-Currency

The same flaw that was used to exploit Equifax is now being used by attackers to mine for the Monero crypto-currency.

Enterprise Tech Videos