Menu

Security / Features

Keep using password managers -- bugs and all

A furor over bugs in password managers left users in a jam. Self-proclaimed security empress Jessy Irwin clears up the confusion

Written by Fahmida Y. Rashid19 Aug. 16 20:00

Why a security team embraces shadow IT

A group within Western Union information security team relies on cloud software, including content management, social collaboration and single sign-on tools to let employees to get their work done while protecting corporate data.

Written by Clint Boulton18 Aug. 16 21:00

US senators want airline IT meltdowns to end

Two high-profile airline technology meltdowns stranding thousands of travelers in the past couple weeks have prompted two US senators to push carriers to bolster their technology.
Senators Richard Blumenthal (D-Conn.) and Edward J. Markey (D-Mass.)this week sent a letter to the most recent offenders -- Delta and Southwest -- as well as 11 other airlines to get a better handle on whether or not their information technology systems are reliable and resilient.

Written by Michael Cooney17 Aug. 16 06:05

Snowden: Auction of stolen NSA malware likely political

A public auction of stolen NSA malware may be a warning to the U.S. that blaming Russia for the hack of the Democratic National Committee could have dire consequences, says Edward Snowden, who also famously breached NSA security.

Written by Tim Greene17 Aug. 16 05:47

RiskSense lands $7M for assessment service

RiskSense, software-as-a-service that evaluates the security of corporate networks and generates a risk score, has been self-financed since its launch last year, but now has harnessed venture funding to help boost its R&D and hire marketing and sales staff.

Written by Tim Greene16 Aug. 16 22:28

Cisco uncovers security threat in industrial control system

Cisco’s security intelligence and research group Talos, said that it had reported a serious vulnerability in Rockwell Automation’s industrial control system – the MicroLogix 1400 programmable logic controller (PLC).
The Simple Network Management Protocol exploit could let an attacker take complete remote control of the MicroLogix system and modify the device firmware, letting an invader run his own malicious code on the device.

Written by Michael Cooney16 Aug. 16 02:57

Respect: Windows 10 security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

Written by Fahmida Y. Rashid15 Aug. 16 20:00

Cyberbullying continues to drag Twitter down

Hate speech and bullying are major problems for Twitter, and it's time for the company to decide, once and for all, if it's on the side of the abusers or the abused.

Written by Matt Kapko12 Aug. 16 23:31

‘Mayhem’ wins $2M first prize in DARPA Cyber Grand Challenge

Cyber-reasoning platform Mayhem pulled down the $2 million first prize in a DARPA-sponsored Cyber Grand Challenge competition that pitted entrants against each other in the classic hacking game Capture the Flag, never before played by programs running on supercomputers.

Written by Tim Greene06 Aug. 16 01:29

What's next for LinkedIn?

Following Microsoft's blockbuster $26.2 billion acquisition of LinkedIn, many questions remain regarding the professional social network's future.

Written by Matt Kapko04 Aug. 16 22:00

Do developers really care about security?

InfoWorld talks with GitHub's Jamesha Fisher about the cultural shifts necessary for baking security early into the devops process

Written by Fahmida Y. Rashid04 Aug. 16 20:00

How to protect yourself from common hotel security threats

Frequently travelers who aren't prepared for the security risks associated with staying in hotels put potentially sensitive information and their own personal safety at risk. Here's how to spot common threats, and protect your data while on the road.

Written by Paul Mah03 Aug. 16 22:00

Black Hat: 9 free security tools for defense & attacking

When Black Hat convenes next week in Las Vegas, it will be a rich environment for gathering tools that can be used to tighten security but also - in the wrong hands - to carry out exploits.

Written by Tim Greene29 July 16 08:33

Bugs & Bugs: National Moth Week, PHP, Black Hat & more

National Moth Week, Black Hat exploit presentations, edible insects, Pornhub bug bounty & Zica prevention at the Rio Olympics all come up on Bugs & Bugs Facebook Live event

Written by Bob Brown29 July 16 06:32

Citrix & LogMeIn complete complicated, tax-free sort-of merger

LogMeIn, the makers of the popular remote desktop software as well as IT security and other offerings, will become part of a Citrix subsidiary in the wake of a complicated, $1.8 billion transaction announced Tuesday by the two companies.

Written by Jon Gold28 July 16 07:18

Market Place

Computerworld
ARN
Techworld
CMO