Search Results For: security.aspx

Google security researchers learn about exploits and zero-day vulnerabilities in third-party software all the time, and for years the company has immediately notified the affected vendors about the issues, worked with them closely to fix the problems, and both notified the public within 60 days of discovering the vulnerabilities and also encouraged... Read more...
Twitter has had more than its share of security breaches on its accounts of late, from the Wall Street Journal and New York Times to CBS to Burger King and Jeep, and now the social platform is addressing security by rolling out login authentication. In a blog post, Twitter’s product security team said, “We... Read more...
Mobile device security is without a doubt a glaring area of weakness for both enterprises and the average Joe, and various security measures are being developed to address it. The latest effort on that front involves a partnership between mobile chipmaker Qualcomm and security firm Kaspersky Labs. According to the Inquirer, Kaspersky security... Read more...
Facebook is making it easier to recover your Facebook account in the event that you ever forget your password (which, let’s be honest, we’ve all done once or twice). Instead of going through the rigamarole of resetting your password and answering a bunch of security questions to do so, the social network... Read more...
Here’s one more thing you can fret about: Security evaluator ISE has discovered that a number of popular SOHO routers and WiFi access points are vulnerable to hacking. The firm calls the vulnerability a “critical security” problem, which is to say that a remote hacker could take over a router and... Read more...
There's been much talk about security on Android in recent months, and it seems likely that it's a subject we won't be dropping anytime soon. Recently, we discovered that Android is susceptible to simple email attachment attacks, and not long before that, Google detailed how it was keeping its Google Play store more... Read more...
Imagine a world without passwords. Scary, right? There's no doubt that passwords are an integral part of computing, because they allow us the easiest form of security when accessing our online accounts. But, as has been evidenced time and time again, passwords are far from bulletproof, especially if you generally... Read more...
Own a website that runs on WordPress? You'll want to pay attention to this story. Since last week, there's been an ongoing brute-force attack that's targeted stand-alone WordPress installations. Like most login prompts, WordPress' will lock you out for some time after putting in an incorrect password a certain number... Read more...
Amid growing fears of security threats to online services, one that is often overlooked is flat-out burglary, which is the old-fashioned way of getting hacked. Movie streaming service Vudu revealed that its offices were burglarized on March 24th, and thieves made off with hard drives, among other things. According to an FAQ that Vudu posted... Read more...
I'm sure it comes as a surprise to no one that Google is a great place to find some questionable items online, whether it's malware, exploits, someone belly-flopping a pool of ice - whatever. However, even with as much as what Google offers, there are many things that the company doesn't track and publish online. For... Read more...
Just because an attack is bizarre doesn’t mean it isn’t dangerous. According to security researcher Brian Krebs (pictured), the FBI and Department of Homeland Security (DHS) posted a security bulletin concerning TDoS (telephony denial-of-service) attacks on PSAPs (public safety answering points). “Information received from... Read more...
It’s an obvious solution to a rampant problem, and indeed, biometric security measures will be coming to more and more mobile devices in the near future. As we rely more on our smartphones for everything from communications to content consumption to banking, there’s a deep well of data parked on or... Read more...
If there's one thing that goes hand-in-hand with technology, it's security flaws. Rarely, though, are such flaws actual features, such as one Apple just had to rush to patch up. Late last week, the company rolled-out two-step verification, where a pin code sent to your mobile phone could be used in conjunction with a... Read more...
A new survey reveals that around 3 percent of all computer users surf naked on the web, which is to say they choose not to protect their PC with any security software at all, as opposed to literally surfing naked (a statistic we care not to know, thank you very much). That means the vast majority are rocking some form... Read more...
File this one under “Worst News of the Day”. According to a report from Cenzic, a staggering 99% of all web-based and mobile apps it tested have security vulnerabilities that can be exploited by cybercriminals, and the median number of vulnerabilities per app is thirteen. The included infographic shows the areas of vulnerability... Read more...
Another day, another security breach. This time it’s Evernote, the popular cloud-based “remember everything” service whose product offerings have increased substantially recently to include business-oriented tools. According to a post on Evernote’s website, the company spotted some suspicious... Read more...
Samsung is already gobbling up market share in the consumer mobile space, so why not tackle the enterprise, too? The company has already invaded the business world by virtue of the BYOD trend, but now Samsung is taking steps to improve device security by releasing KNOX, a “comprehensive mobile solution for work... Read more...
Spammers are changing tactics, and Google is trying to get the word out. These days, the bad guys are using hijacked accounts to launch their scams. By now, spam filters can spot old-school spam mail with reliability, but it’s harder to snag emails that appear to be from your friends – both for the filter... Read more...
In the immortal words of radiohead: “You do it to yourself...and that’s why it really hurts.” Security company Bit9 is surely feeling those words after being hacked late last week when attackers targeted computers within Bit9’s own network that weren’t protected by Bit9’s own... Read more...
In tandem with a release of new security updates for Adobe Flash Player for Windows, Mac, Linux, and Android operating systems (which patch a vulnerability “that could cause a crash and potentially allow an attacker to take control of the affected system”), Adobe’s ASSET Platform Security Strategist... Read more...
In the cloud storage and sharing market, Dropbox is the prototypical service that everyone emulates, and LogMeIn’s new offering, Cubby, indeed bears a striking resemblance. Like Dropbox, it offers 5GB of free cloud storage that you can access, manage, and edit via a Web browser, mobile device, or synced desktop folder. If you invite... Read more...
On Wednesday, GitHub expanded and improved its search feature to make it easier to locate code stashed on the site by live-indexing newly uploaded code. In theory, it sounds like a nice improvement on the site’s ability to deliver results to those looking for certain code or developers, but it appears that the... Read more...
Prev 1 2 3 4 5 Next