Topic:

Security

Latest Headlines

Latest Headlines

How would the Senate's revised surveillance bill impact governance?

The fact that Congress is considering an abstract concept to specify explicitly "identity" may open the door for private firms to do the same. But how could such a system identify people while maintaining privacy?

Spotlight: The meaning of 'public' in a world of privacy

Should the public's right to data be defined before the law starts interpreting "public data" as something to which everyone has a right?

Dropbox disabling links to possible PDF malware, reports Cyren

The distribution sources for potentially malicious documents are actively working to disable their distribution. But a Dropbox security alert seems to indicate that's making customers mad.

Sprint to resell Google Apps for Business, adding 24x7 support

Reviving a sales model that goes back to the 1980s, the reseller becomes the customer's point-of-presence for Google's SMB applications.

Cisco tries new collaboration, compliance tools for diverse work environments

How can the largest producer of collaboration appliances make collaboration work where appliances typically don't? Cisco engineers are tackling the problem before they're tackled by it.

Ponemon: One-third of security professionals never talk with executives

The most eye-opening survey numbers from Ponemon to date imply that no one--absolutely no one--is actually implementing security governance standards as specified.

Spotlight: They're not really 'back doors' if Apple gives them brass knockers

Last Monday in Spotlight, I pointed you toward an article from the personal blog of security researcher Jonathan Zdziarski, who reported on the existence of several exploitable back doors around security features in Apple's iOS.

Security firm warns of 'massive' malware infections impacting WordPress sites

Security firm Sucuri is warning WordPress admins that a "massive" malware infection is wreaking havoc on WordPress websites. Sites with outdated plugins or weak passwords are particularly at risk.    

Spotlight: iOS 7 remains wide open to exploits, says researcher

Among the many things Apple is notorious about not telling people is the architecture of its iOS system services. While on the surface you'd think Apple is operating in the best interests of security, what this means is that an active open source movement has germinated with the explicit goal of ferreting out ways to establish rootkits and other exploitative, stealth services on iPhones and iPads. 

Ping takes a swing at replacing passwords with mobile devices

The system Ping Identity has been building (and to some extent, acquiring) to let people log onto services with their mobile phones is now ready for public launch.