Search Results For: security.aspx
by
Seth Colaner - Thu, May 30, 2013
Google security researchers learn about exploits and zero-day vulnerabilities in third-party software all the time, and for years the company has immediately notified the affected vendors about the issues, worked with them closely to fix the problems, and both notified the public within 60...
Read more...
by
Seth Colaner - Wed, May 22, 2013
Twitter has had more than its share of security breaches on its accounts of late, from the Wall Street Journal and New York Times to CBS to Burger King and Jeep, and now the social platform is addressing security by rolling out login...
Read more...
by
Seth Colaner - Mon, May 13, 2013
Mobile device security is without a doubt a glaring area of weakness for both enterprises and the average Joe, and various security measures are being developed to address it. The latest effort on that front involves a partnership between mobile chipmaker Qualcomm and security firm Kaspersky...
Read more...
by
Seth Colaner - Thu, May 02, 2013
Facebook is making it easier to recover your Facebook account in the event that you ever forget your password (which, let’s be honest, we’ve all done once or twice). Instead of going through the rigamarole of resetting your...
Read more...
by
Seth Colaner - Fri, Apr 26, 2013
Here’s one more thing you can fret about: Security evaluator ISE has discovered that a number of popular SOHO routers and WiFi access points are vulnerable to hacking. The firm calls the vulnerability a “critical...
Read more...
by
Rob Williams - Sat, Apr 20, 2013
There's been much talk about security on Android in recent months, and it seems likely that it's a subject we won't be dropping anytime soon. Recently, we discovered that Android is susceptible to simple email attachment attacks, and not...
Read more...
by
Rob Williams - Mon, Apr 15, 2013
Imagine a world without passwords. Scary, right? There's no doubt that passwords are an integral part of computing, because they allow us the easiest form of security when accessing our online accounts. But, as has been evidenced time and...
Read more...
by
Rob Williams - Sat, Apr 13, 2013
Own a website that runs on WordPress? You'll want to pay attention to this story. Since last week, there's been an ongoing brute-force attack that's targeted stand-alone WordPress installations. Like most login prompts, WordPress' will...
Read more...
by
Seth Colaner - Wed, Apr 10, 2013
Amid growing fears of security threats to online services, one that is often overlooked is flat-out burglary, which is the old-fashioned way of getting hacked. Movie streaming service Vudu revealed that its offices were burglarized on March 24th, and thieves made off with hard drives, among...
Read more...
by
Rob Williams - Mon, Apr 08, 2013
I'm sure it comes as a surprise to no one that Google is a great place to find some questionable items online, whether it's malware, exploits, someone belly-flopping a pool of ice - whatever. However, even with as much as what Google...
Read more...
by
Seth Colaner - Wed, Apr 03, 2013
Just because an attack is bizarre doesn’t mean it isn’t dangerous. According to security researcher Brian Krebs (pictured), the FBI and Department of Homeland Security (DHS) posted a security bulletin concerning TDoS (telephony denial-of-service) attacks on PSAPs (public safety...
Read more...
by
Seth Colaner - Sat, Mar 30, 2013
It’s an obvious solution to a rampant problem, and indeed, biometric security measures will be coming to more and more mobile devices in the near future. As we rely more on our smartphones for everything from communications to...
Read more...
by
Rob Williams - Sun, Mar 24, 2013
If there's one thing that goes hand-in-hand with technology, it's security flaws. Rarely, though, are such flaws actual features, such as one Apple just had to rush to patch up. Late last week, the company rolled-out two-step verification...
Read more...
by
Paul Lilly - Sun, Mar 24, 2013
A new survey reveals that around 3 percent of all computer users surf naked on the web, which is to say they choose not to protect their PC with any security software at all, as opposed to literally surfing naked (a statistic we care not...
Read more...
by
Seth Colaner - Wed, Mar 06, 2013
File this one under “Worst News of the Day”. According to a report from Cenzic, a staggering 99% of all web-based and mobile apps it tested have security vulnerabilities that can be exploited by cybercriminals, and the median number of vulnerabilities per app is thirteen. The...
Read more...
by
Seth Colaner - Sat, Mar 02, 2013
Another day, another security breach. This time it’s Evernote, the popular cloud-based “remember everything” service whose product offerings have increased substantially recently to include business-oriented tools...
Read more...
by
Seth Colaner - Thu, Feb 28, 2013
Samsung is already gobbling up market share in the consumer mobile space, so why not tackle the enterprise, too? The company has already invaded the business world by virtue of the BYOD trend, but now Samsung is taking steps to improve...
Read more...
by
Joshua Gulick - Tue, Feb 19, 2013
Spammers are changing tactics, and Google is trying to get the word out. These days, the bad guys are using hijacked accounts to launch their scams. By now, spam filters can spot old-school spam mail with reliability, but it’s harder...
Read more...
by
Seth Colaner - Mon, Feb 11, 2013
In the immortal words of radiohead: “You do it to yourself...and that’s why it really hurts.” Security company Bit9 is surely feeling those words after being hacked late last week when attackers targeted computers within...
Read more...
by
Seth Colaner - Sat, Feb 09, 2013
In tandem with a release of new security updates for Adobe Flash Player for Windows, Mac, Linux, and Android operating systems (which patch a vulnerability “that could cause a crash and potentially allow an attacker to take control...
Read more...
by
Seth Colaner - Wed, Feb 06, 2013
In the cloud storage and sharing market, Dropbox is the prototypical service that everyone emulates, and LogMeIn’s new offering, Cubby, indeed bears a striking resemblance. Like Dropbox, it offers 5GB of free cloud storage that you can access, manage, and edit via a Web browser, mobile device, or synced desktop folder. If you invite...
Read more...
by
Seth Colaner - Fri, Jan 25, 2013
On Wednesday, GitHub expanded and improved its search feature to make it easier to locate code stashed on the site by live-indexing newly uploaded code. In theory, it sounds like a nice improvement on the site’s ability to deliver...
Read more...