Access Control

Access Control news, information, and how-to advice

Gameover malware targets accounts on employment websites

In addition to CareerBuilder, new variants of the Trojan program target Monster.com, researchers from F-Secure said


Slideshow

20 infamous hacker security vendor break-ins

Here are 20 of the most notorious known break-ins over the past decade.

Some Samsung Galaxy devices contain a file access backdoor, Replicant developers say

A software program shipped with some Samsung mobile devices allows access to the file system through the modem, the developers said

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

Slideshow

How to protect virtual machines (VMs)

These four products represent different approaches to VM security

Joomla receives patches for zero-day SQL injection vulnerability, other flaws

An exploit for the SQL injection vulnerability has been publicly available for over a month, said security researchers from Sucuri

NSA created 'European bazaar' to spy on EU citizens, Snowden tells European Parliament

National spy agencies across Europe are allowing the NSA to piece together their data into a larger picture, Snowden said

The paranoid's survival guide, part 1: How to protect your personal data

Who says privacy is dead? While it's true that marketers, the government, data aggregators and others are gathering and analyzing more data than ever about every individual, you can still exert some control over what's out there,...

Logicalis eBook: SAP HANA: The Need for Speed

Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes

Slideshow

Hot, new products from RSA

Our roundup of new security products on hand at this week's show.

Slideshow

15 Ways to Make Sense of Calls for NSA Reform

President Obama has called for reforms to the National Security Agency's programs in order to strike a balance between privacy and security. However, contrasts abound between what the president has said and what his own review group...

Slideshow

The 12 most powerful security companies

It’s not just revenues and size; influence counts, such as when a company makes widely-used software that gives them control over the security architecture of vendors and users; and certainly, excellence matters--some...

Worm called The Moon infects Linksys routers

A self-replicating program infects Linksys routers by exploiting an authentication bypass vulnerability

2013 Cyber Risk Report

The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat landscape.

Slideshow

Top 10 security tools in Kali Linux 1.0.6

When it comes to forensics, penetration and security testing Kali Linux – which is designed for security professionals and packed with more than 300 security testing tools -- is arguably the most developed of the Linux...

If Target got breached because of third party access, what does that mean for you?

The real opportunity for security professionals is to side-step speculation and use the coverage to spark productive conversations. The kinds of discussions that help others understand your value and set the stage for necessary...

Cybercriminals compromise home routers to attack online banking users

Attackers changed the DNS configuration of vulnerable home routers to mount man-in-the-middle attacks against users in Poland

Hackers try to hijack Facebook, other high profile domains through domain registrar

Some registration information for facebook.com was changed, but the domain was not redirected to an unauthorized server

Internet Security Threat Report 2014

The Internet Security Threat Report (ISTR) provides an analysis of the year's global threat activity, based on data from the Symantec™ Global Intelligence Network.

Yahoo attack places spotlight on identity management

Theft of credentials highlights risk of using the same usernames and passwords across multiple accounts

GoDaddy owns up to role in Twitter account hijacking incident

PayPal dismissed claims that its customers representatives were tricked into helping the attacker

Suspected email hackers for hire charged in four countries

Authorities in the U.S., India, China and Romania crack down on websites offering email hacking services

Romanian authorities arrest man suspected of being celebrity hacker Guccifer

Over the past year, Guccifer hacked into the email addresses of US and foreign politicians, celebrities and other public figures

Load More