DarkReading.com
Dark Reading is the premier online resource helping information security professionals manage
the balance between protection and access. It offers breaking news and analysis on attacks, breaches and vulnerabilities,
as well as strategies for protecting enterprise data. It also offers guidance on setting risk management and compliance policies.
Aktualizace: 10 let 3 týdny zpět
Target Begins Security And Compliance Makeover
Security gets a higher exec profile at the beleaguered retailer in the wake of its massive data breach as Target starts the road to reorganizing its security and compliance operations
Kategorie: Hacking & Security
Yahoo Unfriends Facebook, Google Sign-In
Yahoo drops third-party logins, will soon require Yahoo IDs
Kategorie: Hacking & Security
New Technique Targets C Code To Spot, Contain Malware Attacks
Practical Root Exploit Containment tool refines anomaly detection
Kategorie: Hacking & Security
Target Seeks New CIO
Data breach last year prompts CIO Beth Jacob to resign; Target will hire interim CIO and chief compliance officer
Kategorie: Hacking & Security
Belkin Secures Computing Enviornment With Webcam Adapter, USB Peripheral Switch
New products help mitigate cyberthreats and improve network safety for government agencies, financial institutions, and others
Kategorie: Hacking & Security
Bromium Labs Finds YouTube Ads Serving Malware
Team discovers classic drive-by download attack on YouTube infecting users by exploiting client software vulnerabilities
Kategorie: Hacking & Security
InformationWeek And Dark Reading Present SECURITY
Half-day event to address new, sophisticated attacks being launched against enterprises
Kategorie: Hacking & Security
Informatica And Imperva Partner To Deliver Layered Database Privacy And Security
Imperva will resell Informatica's data masking technology
Kategorie: Hacking & Security
Identity Finder, Verdasys Team
Companies to integrate Identity Finder's Sensitive Data Manager enterprise solution with Verdasys' Digital Guardian and Managed Service for Information Protection offering
Kategorie: Hacking & Security
Securing Software Requires Design, Testing, And Improvement
Adopting secure development, incorporating frequent testing, and creating measures of software security are important to create more secure code
Kategorie: Hacking & Security
Security Processor Increases Data Center Security
Freescale announces support from Silicom and Green Hills Software for its C29x crypto coprocessor
Kategorie: Hacking & Security
BlackBerry Introduces New Products And Services
Announcements are part of BlackBerry’s ongoing strategy to stabilize the company and restore customer confidence
Kategorie: Hacking & Security
Entrust Integrates Biometric Fingerprint Authentication
Entrust IdentityGuard 10.2 Feature Pack 1 will include 3M Cogent biometric fingerprint capture and verification technology
Kategorie: Hacking & Security
Mt. Gox Bitcoin Meltdown: What Went Wrong
Transaction malleability attacks and cold-storage software bugs both cited after nearly $500 million worth of bitcoins vanish
Kategorie: Hacking & Security
Messaging App Wickr Secures $9M+ From World's Leading VCs, Entrepreneurs, Hackers And Feds
Wickr is an encrypted, self-destructing messaging app, serving more than 1 million messages each day
Kategorie: Hacking & Security
Security Firms Face Crisis Of Trust
Mikko Hypponen reflects on shift toward rampant government spying and use of malware -- and targeted attack attempts on F-Secure
Kategorie: Hacking & Security
Cisco And NineSigma Announce $300,000 Grand Challenge To Secure Internet Of Things
Cisco is seeking solutions for malware defense, security credential management, and privacy protection
Kategorie: Hacking & Security
Malware-Lobbing Hackers Seize 300,000 Routers
Hackers launch scam and malware campaigns after compromising a variety of routers running firmware with known vulnerabilities
Kategorie: Hacking & Security
Researchers Create Legal Botnet Abusing Free Cloud Service Offers
Hack depends on scripts creating scores of unique email addresses and automating execution of email verification
Kategorie: Hacking & Security
Feds Look To Big Data On Security Questions
Government IT leaders believe continuous monitoring and advanced analytics can help agencies better understand their networks and security
Kategorie: Hacking & Security