Security News & Reviews - Page 5
More Security News
Check Point software claims that mobile apps were being used in one of the largest ever malware campaigns on Google Play.
Supervisory Control and Data Acquisition (SCADA) systems are a core element of modern infrastructure and like all forms of technology are at risk from security vulnerabilities.
SPARTAN Cloud is the first security product that enables secure connections to AWS, Azure and Google Cloud based on Transport Layer Security (TLS).
The European Union's General Data Protection Regulation (GDPR) rules include strict requirements on breach reporting and disclosure that organizations need to prepare for, to avoid potential penalties.
Security firm raises new funds as it aims to give back to existing shareholders and grow technology base that can help defend against issues like WannaCry.
NEWS ANALYSIS: Quantum computing's potential for cracking encryption worries the National Security Agency, so it is developing standards and strategies to support encryption in a post-quantum world.
For many organizations the threat of data breaches and data thefts caused by insiders is an even bigger worry than cyber-attacks by outsiders. Here are the steps IT managers should take to prevent data losses caused by insiders.
Beta release of Red Hat's flagship Linux platform adds support for Network Bound Disk Encryption and the USBGuard software framework, providing improved security.
Cylance expands its security platform with new threat hunting technology that provides visibility into endpoint risks.
The number of published software flaws climbed by 30 percent, and while breaches rose only moderately, a number of large breaches caused the total of exposed records to climb precipitously.
Kaspersky Lab's malware report for the first quarter of 2017 shows a dramatic spike in ransomware with such attacks growing particularly fast on mobile devices.
200 million users could potentially be at risk from vulnerabilities in streaming media players that can enable malicious subtitles to takeover systems.