Security News & Reviews

More Security News


How Good Collaboration Software Can Help Erase Shadow IT SLIDESHOW

Employees will turn to risky shadow IT solutions if their collaboration technology isn’t easy to use. The right collaboration technology will balance security with ease of use.

Google Downplays Report On Android Location Data Collection

Company says data was collected as part of a heartbeat function to maintain connectivity but never actually used.

Microsoft Warns of Late-Year Spike in Office Threats

Online attackers are using recent Office exploits and increasingly sophisticated methods to infect PCs, warns the software giant.

AWS Secret Region Debuts as a Cloud for U.S. Intelligence Community

The new cloud region expands availability for the U.S. Intelligence Community by providing access for secret-level clearance usage.
Daily Tech Briefing Nov. 21, 2017

China Delaying Release of Critical Vulnerability Reports, Analysis Finds VIDEO

DAILY VIDEO: Data shows China likely delaying vulnerability reports to help attacks; Workday HCM will modernize HR portals with a smarter employee experience; Google announces an enterprise version of its Dialogflow chatbot API; and there's more.

Intel Patches Management Engine for Critical Vulnerabilities

Security researchers discover flaws in Intel's Management Engine that could enable attackers to run unsigned code.

Research: Half of Enterprises Suffered Insider Attacks in Last 12 Months

Survey is based on a comprehensive online survey of 472 cybersecurity professionals, which provides deep insight into current security trends.
IoT Toy Security Risk

Consumers Want IoT Toys Regardless of Security, Survey Finds

As the holiday shopping season gets underway, many consumers will pick up new internet of things devices, even though many of those devices might represent security risks.
North Korea Hacker Groups

North Korea-Backed Lazarus Group Takes Aim at Android Security

McAfee discovers new mobile malware that is linked to the same group that was behind the attack on Sony Pictures and the recent WannaCry ransomware worm.
Protecking Networks from North Koreans

Five Steps to Keep North Korean Hackers Out of Your Network

NEWS ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can keep them from getting the data they want.
Daily Video 1117

Some States to Start Auditing Election Results to Check for Vote Fraud VIDEO

DAILY VIDEO: States starting to implement audits to bolster election integrity; North Korea getting ready wage a global cyber war, Experts Say; Google Job Search results now include salary data or estimates; and there's more.
security flaws

Data Shows China Likely Delaying Vulnerability Reports to Help Attacks

While China’s national vulnerability database publishes details of security issues faster than its U.S. counterpart, the cases where it is slower suggest that authorities are delaying publication of vulnerabilities useful for exploiting adversaries’ systems, an analysis finds.
Armis CEO

Armis CTO Details Business Impact of BlueBorne Security Risks VIDEO

VIDEO: Nadir Izrael, co-founder and CTO of Armis Security discusses the expanding impact of the BlueBorne bluetooth security vulnerability that his firm discovered.

Enterprise Tech Videos