Access Control

Access Control news, information, and how-to advice

Cisco advises users to lock down WebEx to prevent snooping

A security researcher found potentially sensitive meetings open for anyone to join

What you should consider when choosing a password manager

Password managers offer many convenient options, but some come at the expense of security


148470916

Yahoo says attackers looking for Shellshock found a different bug

The bug has now been fixed and user data was not at risk, the company said

McAfee’s most dangerous cyber celebrities of 2014

Musicians dominate the 2014 list of celebs you might not want to search on for fear of malware

The FBI’s big, bad identification system

The FBI’s formidable Next Generation Identification is up and running

healthcare.gov

HealthCare.gov still struggling with security

The Inspector General (IG) of the Health and Human Services Department has released a report detailing the state of security on HealthCare.gov and the results of vulnerability scans performed in April and May of this year. The...

freedom

Restoring user freedom in the security-first enterprise

As organizations step up their game to address new threats, there is one key stakeholder who often goes unnoticed: the end user

ebay sign

Is eBay trading too much security for seller happiness?

Criminals are exploiting an eBay security weakness that could result in shoppers getting redirected to a malicious webpage that tries to steal bank account information.

cell tower

Rogue cell towers discovered in Washington, D.C.

After initially discovering more than a dozen rogue cell towers in the U.S., ESD America and IntegriCell discovered more questionable towers in the nation's capitol, 15 of them to be exact. Ownership remains unknown, but Tuesday's...

iphone6

Quick tips before you switch to a new iPhone

Millions of people are switching to the latest iPhone this week. But before you trade-up, here's some basic tips to help protect your new device, both at home and at the office.

Salesforce warns customers of malware attack

A new version of the Dyreza online banking Trojan is stealing Salesforce.com log-in credentials

Hackers launch Apple ID phishing campaign playing on iCloud security worries

Phishing emails masquerade as security alerts from Apple about rogue iTunes purchases, researchers from Symantec said

Cyberespionage group starts using new Mac OS X backdoor program

The new malware program is an OS X version of a Windows backdoor called XSLCmd, researchers from FireEye said

LinkedIn beefs up account security with session management, detailed alerts

LinkedIn now allows users to see and terminate their authenticated sessions from multiple devices

medical 3

Configuration errors lead to HealthCare.gov breach

The Health and Human Services Department (HHS) said that HealthCare.gov, the nation's health insurance enrollment website, was breached in July and that the attackers uploaded malware to the server. Officials say that while the...

Hackers make drive-by download attacks stealthier with fileless infections

New attacks with the Angler exploit kit inject code directly in browser processes without leaving files on disk, a researcher found

Internet of Things

Three security practices that IoT will disrupt

As the field of IoT devices continues to grow, so do the threats to well-established security practices

New malvertising campaign hit visitors of several high-profile sites

Attackers redirected users to Web-based exploits by pushing malicious advertisements onto popular sites, researchers from Fox-IT said

Attack targets firms from the automobile industry in Europe

Attackers are sending emails containing a new information-stealing Trojan program to customer service departments, Symantec researchers said

security risk

SDS still young, but very much on the rise

Offering increased protection and a simplified approach, software-defined security is shaping up to be the next big thing in IT security

Load More