Google's new <a href="http://www.pcworld.com/article/247719/visa_certifies_smartphones_for_nfc_payments.html">NFC system</a> that purports to turn your phone into a credit card can be compromised using a brute-force attack -- and that raises questions about its security.
Sarah Jacobsson Purewal |
10 Feb |
Read more
Google today patched 20 vulnerabilities in the desktop edition of Chrome and added new anti-malware download warnings to version 17.
Gregg Keizer |
09 Feb |
Read more
Google plans to remove online certificate revocation checks from future versions of Chrome, because it considers the process inefficient and slow.
Lucian Constantin |
09 Feb |
Read more
From the start, <a href="http://www.csoonline.com/article/697628/google-chrome-finally-gets-malware-download-protection">Google's Safe Browsing API</a> was designed to spot malicious web pages so users wouldn't get trapped in them. Google identifies these sites through its own algorithms and user notification.
George V. Hulme |
08 Feb |
Read more
With the ongoing rollout of <a href="http://www.computerworld.com/s/article/9220204/Facebook_revamps_profile_with_timeline_concept">Facebook's Timeline feature</a>, security and privacy have never been more important to your digital life. The new layout presents all of your current and past activities on <a href="http://www.computerworld.com/s/article/9157638/Facebook_Complete_coverage">Facebook</a> -- posts, photos, comments, likes and so on -- in a handy timeline format to anyone with access to your profile, which may include friends of friends, colleagues, executives at your company, a potential future boss ... well, you get the idea.
Logan Kugler |
08 Feb |
Read more
Kids these days. Where once toilet-papering the school gymnasium was considered a genius sort of prank, US authorities in Nebraska were flummoxed when a school experiencing intermittent network access was found to have been hacked in an unusual way.
David Braue |
06 Feb |
Read more
Google has unveiled Bouncer, its answer to the growing threat of maliciously laced software available on the Android Market.
Liam Tung |
03 Feb |
Read more
I had the opportunity to speak at a new security conference last week, Security Threats 2012. I presented on the topic of balancing business benefits with risks in the cloud (more on that later), but the event touched on a wide range of pertinent IT topics, provoking stimulating discussions of some of the most pressing challenges business leaders are facing.
Bernard Golden |
03 Feb |
Read more
Mark Zuckerberg outlined his company's US$5 billion initial public offering that at Facebook's heart is an approach he calls the "Hacker Way".
Liam Tung |
02 Feb |
Read more
Facebook's <a href="http://www.pcworld.com/article/248925/facebook_timeline_looms_what_you_need_to_know.html#tk.hp_pop">Timeline is coming</a>, <a href="http://www.pcworld.com/article/248935/timeline_launch_nears_but_few_users_like_it_survey_finds.html#tk.hp_new">whether you like it or not</a>, to Facebook accounts everywhere - including yours. I've been using Timeline for about a month now, and I'm not sure how I feel about it.
Sarah Jacobsson Purewal |
01 Feb |
Read more
Facebook on Tuesday named the five people it believes were behind the notorious Koobface worm, which duped a few hundred thousand Facebook users into downloading its malware.
Liam Tung |
18 Jan |
Read more
In an effort to challenge programmers worldwide, Facebook has brought back its <a href="https://www.facebook.com/hackercup">Hacker Cup</a> contest for a third round, the company announced Wednesday.
Joab Jackson |
05 Jan |
Read more
<a href="http://www.networkworld.com/news/2011/020811-check-point-blade.html">Check Point</a> and <a href="http://www.networkworld.com/news/2011/091511-amazon-web-services-receives-critical-250944.html">Amazon Web Services</a> are teaming up to enable Check Point Security Gateway functionality to boost cloud security for business assets.
Tim Greene |
05 Jan |
Read more
The principle of least privilege is an information security fundamental. But applications that fail by asking for more than they need aren't necessarily poorly written. Maybe they're just being realistic.
Stilgherrian |
22 Dec |
Read more
As a research scientist for Barracuda networks, Daniel Peck has spent much of his time in the last year looking at activity on social networks and analyzing the common tactics used to scam, phish and otherwise trick people into clicking on bad links. A break down of the malicious activity on social networks can be found in By the numbers: How dangerous are Facebook, Twitter, search results (really)?
Joan Goodchild |
09 Dec |
Read more
In his presentation titled "The dark side: Measuring and analyzing <a href="http://www.csoonline.com/article/497076/5-facebook-twitter-scams-to-avoid">malicious activity on Twitter and Facebook</a>," Daniel Peck, research scientist with <a href="http://www.barracudanetworks.com/ns/?L=en">Barracuda Networks</a>, delves into the details of how cybercriminals trap people on social networks. Peck's research also uncovered that user perceptions of <a href="http://www.csoonline.com/topic/587704/social-networking-security">social networking security</a> contrasts drastically with actual membership rates, which you can read about in <a href="http://www.csoonline.com/article/696138">Facebook may be scary, but we love it anyway</a>.
Joan Goodchild |
09 Dec |
Read more
These days barely a day goes by where there isn’t some sort of network security breach or hack or malfunction of some sort. This year too we had the rise of groups such as Anonymous and Lulz that sought out attention for their activities. Here we take a look at the year in pictures of some of the key security problems that grabbed our attention.
Michael Cooney |
08 Dec |
Read more
A Facebook bug came back to haunt the company's co-founder and CEO, Mark Zuckerberg.
Sharon Gaudin |
08 Dec |
Read more
<a href="http://www.networkworld.com/news/2011/041811-sourcefire-intrusion-prevention-system.html">Sourcefire</a> Monday said it expects to begin shipping its first two next-generation firewall appliances later this month, entering an increasingly crowded market.
Ellen Messmer |
06 Dec |
Read more
Social media is sometimes regarded as a double-edged sword.
Phil Vasic |
30 Nov |
Read more