Access Control

Access Control news, information, and how-to advice

Runaway Train
breach bucket

sony pictures booth

Destover variant signed with stolen Sony certificate was part of a joke

On Tuesday, researchers at Kaspersky Lab reported that a sample from the Destover family of malware – the same family used to attack Sony Pictures – was signed by a stolen Sony certificate. As it turns out, the sample was part of a...

present gift snow holiday

Security executives reveal their holiday wish lists

Do you know any security executives who say they have everything they need to keep their organizations safe from threats? Chances are you don’t.

Binary bomb with a lit fuse

The breach at Sony Pictures is no longer just an IT issue

Sony Pictures is in the middle of a nightmare thanks to a group of people with an axe to grind. On Monday, Sony's hackers published thousands of documents compromised during the attack, exposing the company's most important assets -...

webcam laptop

Webcam snooper now looking for a job

Insecam's creator, possibly based in Moldova, is looking for remote programming work

us uk flags

Governments act against webcam-snooping websites

Insecam, which broadcast feeds from unsecured webcams, no longer works

alliance cooperation

Microsoft: Competing AV vendors need to remember who the bad guys are

Some vendors, particularly in China, are playing hardball to get their antivirus products installed

fingerprint detail on male finger

Are fingerprints PINs or physical artifacts?

A judge’s ruling that a person can be forced to open his phone with his fingerprint ignores the fact that the fingerprint scan is just a substitute PIN, which can’t be required by law enforcement.

Cisco advises users to lock down WebEx to prevent snooping

A security researcher found potentially sensitive meetings open for anyone to join

What you should consider when choosing a password manager

Password managers offer many convenient options, but some come at the expense of security

148470916

Yahoo says attackers looking for Shellshock found a different bug

The bug has now been fixed and user data was not at risk, the company said

McAfee’s most dangerous cyber celebrities of 2014

Musicians dominate the 2014 list of celebs you might not want to search on for fear of malware

The FBI’s big, bad identification system

The FBI’s formidable Next Generation Identification is up and running

healthcare.gov

HealthCare.gov still struggling with security

The Inspector General (IG) of the Health and Human Services Department has released a report detailing the state of security on HealthCare.gov and the results of vulnerability scans performed in April and May of this year. The...

freedom

Restoring user freedom in the security-first enterprise

As organizations step up their game to address new threats, there is one key stakeholder who often goes unnoticed: the end user

ebay sign

Is eBay trading too much security for seller happiness?

Criminals are exploiting an eBay security weakness that could result in shoppers getting redirected to a malicious webpage that tries to steal bank account information.

cell tower

Rogue cell towers discovered in Washington, D.C.

After initially discovering more than a dozen rogue cell towers in the U.S., ESD America and IntegriCell discovered more questionable towers in the nation's capitol, 15 of them to be exact. Ownership remains unknown, but Tuesday's...

iphone6

Quick tips before you switch to a new iPhone

Millions of people are switching to the latest iPhone this week. But before you trade-up, here's some basic tips to help protect your new device, both at home and at the office.

Salesforce warns customers of malware attack

A new version of the Dyreza online banking Trojan is stealing Salesforce.com log-in credentials

Load More