Access Control

Access Control news, information, and how-to advice

Internet of Things

New malvertising campaign hit visitors of several high-profile sites

Attackers redirected users to Web-based exploits by pushing malicious advertisements onto popular sites, researchers from Fox-IT said...


Attack targets firms from the automobile industry in Europe

Attackers are sending emails containing a new information-stealing Trojan program to customer service departments, Symantec researchers said...

security risk

SDS still young, but very much on the rise

Offering increased protection and a simplified approach, software-defined security is shaping up to be the next big thing in IT security...

towerbridge

British spy agency scanned for vulnerable systems in 32 countries, German paper reveals

Heise Online reveals top-secret details about the GCHQ's 'Hacienda' program...

zeus

New Gameover Zeus botnet keeps growing, especially in the US

A new Gameover Zeus malware variant has infected over 10,000 systems so far, researchers say...

shutterstock 198227276

How to reduce the risk of insecure firmware in office gear

A firmware study that found dozens of security problems affecting more than 120 products is a reminder to businesses to segregate and control access to networked office gear, experts say....

Amazon protects its virtual desktops with two-factor authentication

The company's WorkSpaces service can be used with hardware tokens from Gemalto...

Seven ways DARPA is trying to kill the password

From analyzing the way you walk to your heartbeat, these futuristic authentication systems could be here soon...

blackhatlogo

Salted Hash: Live from Black Hat USA (Day 3)

Thursday is the day of the week that Hacker Summer Camp takes on some changes. The corporate side of things starts to wind down, and the Black Hat attendees are likely heading to one of two places - DEF CON or home....

Network-attached storage devices more vulnerable than routers, researcher finds

A security review found serious vulnerabilities in 10 popular NAS systems...

erp

ERP: Protecting the pipeline by focusing on business-critical platforms

In early July, news circulated that a Chinese manufacturer stood accused of tampering with the firmware of hand-held scanners in order to target chain resources. So what can organizations do about this type of threat, when they're...

Stealthy malware 'Poweliks' resides only in system registry

The malware is persistent across system reboots, despite not having any files on disk...

Attackers can easily create dangerous file-encrypting malware, new threat suggests

A newly discovered ransomware threat runs as a batch file and uses the open-source GnuPG program for encryption...

Attackers exploit remote access tools to compromise retail systems

DHS warns retailers of threat to point-of-sale systems...

credit card reader

Nearly 600 business impacted by POS malware attack

The United States Secret Service, working with Trustwave, has discovered a series of attacks in the retail sector, which uses customized malware to infect POS systems. The crime itself isn't overly technical, as the criminals behind...

CISOs still struggle for respect from peers

Despite greater security awareness, most C-suite executives continue to undervalue CISOs, survey shows....

Antivirus products riddled with security flaws, researcher says

Antivirus products increase a computer's attack surface and may even lower operating system protections, a security researcher claims...

Internet of things devices contain high number of vulnerabilities, study finds

Security researchers from Hewlett-Packard found 250 security issues when analyzing 10 popular IoT devices...

Evan Schuman: The data dangers of free public Wi-Fi

New York's plan to turn pay phones into free Wi-Fi stations could be a template for other cities, and bad news for IT departments trying to protect corporate data and intellectual property...

Load More