Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

Indianapolis 148492252
Hacked, unlocked, unsafe.

many hands

New mobile-malware detection technique uses gestures

The technology checks if attempts to use certain phone functions are accompanied by natural gestures users are expected to make

foggy morning

Clearing up the fog in implementing cloud security

Joseph Davidson, Senior Network Security Engineer at Adobe, discusses providing holistic security across a range of legacy and acquired products through a file integrity monitoring and configuration monitoring system.

mobile security

9 security gadgets for mobile devices

If you use your smartphone or tablet for work, you need to keep your data secure when you're on the go. We look at nine gadgets that try to keep your important data out of the hands of others.

security cruiser

An SDN vulnerability forced OpenDaylight to focus on security

Open-source software projects are often well intended, but security can take a back seat to making the code work. OpenDaylight, the multivendor software-defined networking (SDN) project, learned that the hard way last August after a...

DDOS attacks less frequent last year, more dangerous

The total number of distributed denial of service attacks declined steadily last year, from more than 450,000 attacks in the first quarter to fewer than 150,000 in the fourth quarter -- but the size and complexity of the average...

hotel room

Flaw in common hotel router threatens guests’ devices

Corporate travelers should be warned that a vulnerable Wi-Fi router commonly used in hotels is easily compromised, putting guests passwords at risk and opening up their computers to malware infections and direct attacks.

security open lock

The state of open source security

Recent high-profile vulnerabilities have put the lie to the 'many eyes' theory -- but also driven real progress in securing the open source ecosystem

breach bucket

Survey: 75% of firms would take hours or longer to spot breach

Although 68 percent of companies said they are prepared for a breach, 75 percent estimated it would take hours, days, or weeks for them to notice that one had occurred

enterprise cloud thinkstock

Study: Compliance biggest cloud security challenge

According to a new report by cloud security company CipherCloud, compliance is the single biggest concern for large organizations looking at cloud adoption

careless workers security

Security best practices for users is your first line of defense

Most savvy businesses are on top of their game when it comes to securing networks, encrypting sensitive data and keeping private customer information safe. But there's a glaring security vulnerability you may not have thought of: your...

zero

Zero day, Web browser vulnerabilities spike in 2014

Secunia found that overall more than 83 percent of vulnerabilities had patches ready when the flaws became public

Rogue A.I.

Microsoft blacklists latest rogue SSL certificates, Mozilla mulls sanctions for issuer

Microsoft revoked trust in an intermediate CA certificate that was used to issue unauthorized certificates for Google websites

gregg steinhafel

What security leaders need to know about the Target breach settlement

Consider these three points before discussing the Target consumer breach settlement with other leaders

Google I/O 2014 Android characters

Android flaw puts personal data at risk for millions

A flaw in Android could allow apps to be modified or replaced by malware, Palo Alto Networks said.

dell e2414hr 24 inch monitor 500x700

Dell support tool put PCs at risk of malware infection

Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers' products. A security researcher discovered the flaw in November and reported it to the PC manufacturer, which...

patch band-aid bandage broken fix

AVG lauded for fast vulnerability response

Security researchers from Tel-Aviv-based enSilo are congratulating anti-virus vendor AVG Technologies for its fast response to a security flaw in one of its programs

android filter

Google's screening process could help mitigate new Android vulnerability

Researchers at Palo Alto Networks' (PAN) Unit 42 have disclosed the details behind a widespread vulnerability that impact 49.5 percent of the current Android base. The flaw enables attackers the ability to hijack the installation of...

lather rinse repeat

Why aren’t you vulnerability scanning more often?

I’ve always been curious about companies that scan their enterprises for vulnerabilities once per quarter or even once per year. Why is this the case exactly? I’ve worked in these environments and I've heard all manner of excuses...

Load More