Android security in the enterprise - can the worst flaws be fixed?
How do Android's growing list of vulnerabilities affect enterprises and is there much they can do about them?
John E Dunn | 10 Aug | Read more
How do Android's growing list of vulnerabilities affect enterprises and is there much they can do about them?
John E Dunn | 10 Aug | Read more
Dr. John Halamka has taken to his <a href="http://geekdoctor.blogspot.com/2015/08/the-security-of-medical-devices.html">"Life as a Healthcare CIO" blog</a> to sound the alarm on medical device threats in the wake of the FDA late last week issuing its first cybersecurity warning about a specific medical device.
Las Vegas -- Security researchers need to fight for the rights to study, modify and reverse engineer Internet hardware and software or the general population risks losing Internet freedom, the Black Hat 2015 conference was told.
Tim Greene | 06 Aug | Read more
A security researcher has posted a video on YouTube demonstrating how a device he made can intercept wireless communications to locate, unlock and remotely start GM vehicles that use the OnStar RemoteLink mobile app.
Lucas Mearian | 31 Jul | Read more
A week after it was revealed that a Chrysler Jeep could be hacked and remotely controlled, two U.S. senators have called for the National Highway Traffic Safety Administration to investigate potential widespread risk for consumers.
Lucas Mearian | 29 Jul | Read more
Next-gen endpoint protection vendor CrowdStrike has landed $100 million in new investments to beef up sales and engineering and continue its push to make anti-virus software obsolete.
Tim Greene | 18 Jul | Read more
Adobe today patched Flash Player to quash a pair of zero-day vulnerabilities found in the massive cache of documents hackers stole from the Hacking Team surveillance company.
Gregg Keizer | 15 Jul | Read more
The Internet of Things is talked about a lot and many people are unsure what it really is, but at DEF CON 23 this summer in Las Vegas, that should become a lot more clear as attendees compete to hack IoT devices.
Tim Greene | 13 Jul | Read more
A panel of distinguished cryptographers says letting law enforcement have access to encrypted communications means more vulnerabilities for criminals to exploit and less secure corporate networks.
Tim Greene | 08 Jul | Read more
While the world's focus on Apple today might be on the release of its new streaming music service, the company also pushed out a host of security fixes for exploits, flaws, and--shall we say--politically difficult situations of the last few months. iOS 8.4 and OS X 10.10.4 should make users safer, pending testing by outside researchers.
Glenn Fleishman | 01 Jul | Read more
Spikes Security wants to fix the problem of the browser by putting it on an appliance
John E Dunn | 30 May | Read more
Cybersecurity is a topic of discussion at most board meetings, according to a new survey of 200 corporate directors.
Maria Korolov | 28 May | Read more
App stores from Google and Samsung reportedly became targets for government hijacking a few years ago, as the National Security Agency and its allies ramped up their data collection efforts.
Jared Newman | 22 May | Read more
Data integrity vendor Guardtime hopes its newly announced protocol will replace RSA for the purposes of authentication and digital signatures, touting it as easier to manage and less vulnerable to hacking.
Tim Greene | 21 May | Read more
At the start of 2014, attackers' favorite distributed denial of service attack strategy was to send messages to misconfigured servers with a spoofed return address -- the servers would keep trying to reply to those messages, allowing the attackers to magnify the impact of their traffic.
Maria Korolov | 20 May | Read more