Menu

Security / Features

Black Hat: 9 free security tools for defense & attacking

When Black Hat convenes next week in Las Vegas, it will be a rich environment for gathering tools that can be used to tighten security but also - in the wrong hands - to carry out exploits.

Written by Tim Greene29 July 16 08:33

Bugs & Bugs: National Moth Week, PHP, Black Hat & more

National Moth Week, Black Hat exploit presentations, edible insects, Pornhub bug bounty & Zica prevention at the Rio Olympics all come up on Bugs & Bugs Facebook Live event

Written by Bob Brown29 July 16 06:32

Citrix & LogMeIn complete complicated, tax-free sort-of merger

LogMeIn, the makers of the popular remote desktop software as well as IT security and other offerings, will become part of a Citrix subsidiary in the wake of a complicated, $1.8 billion transaction announced Tuesday by the two companies.

Written by Jon Gold28 July 16 07:18

Twitter scores live-stream deals with MLB, NBA, NHL and NFL

Twitter's steamy summer of sport got even hotter today as the company inked deals to live-stream MLB and NHL games. Each of the 'Big Four' major U.S. sports leagues is now on board to stream games or related content via Twitter.

Written by Matt Kapko26 July 16 06:06

At Black Hat: A free tool for spear phishing Twitter

A spear phishing tool to automate the creation of phony tweets - complete with malicious URLs – with messages victims are likely to click on will be released at Black Hat by researchers from ZeroFOX.
Called SNAP_R (for social network automated phisher with reconnaissance), the tool runs through a target Twitter account to gather data on what topics seem to interest the subscriber. Then it writes a tweet loaded up with a link to a site containing malware and sends it.

Written by Tim Greene22 July 16 08:04

Cisco patches critical exposure in management software

Cisco UCS Performance Manager versions 2.0.0 and prior are affected and the problem is resolved in Cisco UCS Performance Manager versions 2.0.1 and later. UCS Performance Manager collects information about UCS servers, network, storage, and virtual machines.

Written by Michael Cooney21 July 16 05:16

Carbon Black buys Confer for next-gen anti-virus

Carbon Black has bought Confer to boost its protection for network endpoints using a behavioral form of antivirus combined with cloud analysis of threats rather than traditional signature-based software.

Written by Tim Greene20 July 16 03:08

Wearables could compromise corporate data

Smartwatches, fitness trackers and other wearable devices that are connected to corporate Wi-Fi networks could lead to serious privacy and security issues, experts say.

Written by Matt Hamblen15 July 16 20:00

Bugs & Bugs: As in, the software kind -- and insects

Bugs & Bugs: Gypsy Moth invasion, cyborg locusts, Zero Days -- the movie, bug problems for Lenovo, Symantec & others, and super interesting research from New York University & others aimed at reducing software bugs

Written by Bob Brown11 July 16 07:29

Confusion over cyber insurance leads to coverage gaps

Cyber insurance may be a booming business thanks to the high-profile breaches, but the market for such policies is a complicated, say experts from SANS Institute, Advisen and PivotPoint.

Written by Clint Boulton09 July 16 00:16

Why Snapchat's Memories broadens snap appeal

A new feature from Snapchat, called Memories, should broaden its appeal by making it easier for you to preserve and curate the content you share, but the company's go-to disappearing 'snaps' live on.

Written by Matt Kapko08 July 16 23:27

Compliance Dictionary aims for a simpler life

With the assistance of machine learning, the UCF's Compliance Dictionary seeks to simplify the process of creating common controls with a lexicon that maps the connection between terms in authority documents.

Written by Thor Olavsrud06 July 16 02:54

802.11ac Wi-Fi gear driving strong WLAN equipment sales

The first quarter of 2016 has seen a 20% increase in wireless LAN equipment sales compared to the same period a year ago, according to a study released today by IHS Technology, which credited the proliferation of 802.11ac wireless gear for the uptick.

Written by Jon Gold30 June 16 05:40

Why CIOs should care about click fraud

Click fraud is more than just a marketing problem. It presents a real security risk to your organization, experts say. CIOs need to know their enemy.

Written by Paul Rubens30 June 16 03:13

Gartner’s top 10 security predictions

Gartner has taken a look at five key areas of security concern that businesses face this year and issued predictions on and recommendations about protecting networks and data from threats that will likely arise in each.

Written by Tim Greene23 June 16 23:26

Market Place

Computerworld
ARN
Techworld
CMO