VTech hack exposes personal information of millions of customers

VTech hack exposes personal information of millions of customers

Children's technology and educational toy maker VTech announced that it was recently a victim of a data breach that exposed sensitive information on about five million VTech accounts.

An encryption back door won’t actually help intelligence agencies

An encryption back door won’t actually help intelligence agencies

Intelligence agencies and law enforcement claim they need a back door in encryption algorithms for safety and national security, but the logic is flawed and the fallout from an encryption back door would do more harm than good.

Damballa warns that the enemy may already be in your network

Damballa warns that the enemy may already be in your network

Researchers from Damballa analyze the malware behind the Sony and Saudi Aramco breaches to figure out how it was able to remain undetected for so long.

Patch Tuesday demonstrates strength of Microsoft Edge browser security

Patch Tuesday demonstrates strength of Microsoft Edge browser security

Microsoft released 12 new security bulletins--many addressing remote code execution flaws spanning the Windows operating system and many of the most popular Microsoft applications.

Vera partnership gives Dropbox comprehensive data security

Vera partnership gives Dropbox comprehensive data security

Vera, Okta, and Dropbox team up to provide Dropbox customers with comprehensive, end-to-end security and data protection in the cloud.

TalkTalk hit by data breach and ransom demand

TalkTalk hit by data breach and ransom demand

TalkTalk—a London-based telecommunications company—revealed that its customer database has been breached and that attackers are demanding payment.

HP sells TippingPoint to Trend Micro

HP sells TippingPoint to Trend Micro

HP is divesting itself of TippingPoint--selling the intrusion prevention and mitigation company to its strategic partner, Trend Micro, for $300 million.

Who is responsible for security in the cloud?

Who is responsible for security in the cloud?

Armor (formerly FireHost) teamed up with the Ponemon Institute to research whether the cloud service provider or the company itself is ultimately responsible for cloud security.

Wombat acquires ThreatSim to extend security awareness training capabilities

Wombat acquires ThreatSim to extend security awareness training capabilities

Wombat Security announced that it is adding spear-phishing specific security awareness training to its portfolio with the acquisition of ThreatSim.

Experts warn users to quickly apply Microsoft Patch Tuesday updates

Experts warn users to quickly apply Microsoft Patch Tuesday updates

Security experts weigh in on Microsoft Patch Tuesday with advice about which updates are most urgent and what you need to know to protect yourself against exploits.

Intel Security warns don’t open that email about Armin van Buuren and other ‘dangerous’ celebrities

Intel Security warns don’t open that email about Armin van Buuren and other ‘dangerous’ celebrities

The 9th annual Intel Security Most Dangerous Celebrities list is here and this year it is topped by DJ Armin van Buuren.

HackerOne launches free Vulnerability Coordination Maturity Model tool

HackerOne launches free Vulnerability Coordination Maturity Model tool

HackerOne developed a free benchmarking tool called the Vulnerability Coordination Maturity Model to help organizations determine where they are on the maturity spectrum and identify areas for improvement.

Security experts weigh in on Microsoft’s Patch Tuesday for September

Security experts weigh in on Microsoft’s Patch Tuesday for September

Microsoft released 12 security bulletins for the September 2015 Patch Tuesday and security experts shed light on which should be your top priorities to implement.

Maybe it’s time to eliminate “something you know” as an authentication method

Maybe it’s time to eliminate “something you know” as an authentication method

Something you know is the least secure method of authentication and the easiest to crack or compromise. It's time to stop relying on something you know for secure authentication.

Is Windows 10 the end of privacy as we know it?

Is Windows 10 the end of privacy as we know it?

Some are freaking out over Windows 10 privacy settings but Microsoft is not "Big Brother" and the features and services that make Windows 10 great require some tradeoffs of privacy for functionality.

Why Oracle CSO attempt to shoot the messenger is misguided

Why Oracle CSO attempt to shoot the messenger is misguided

Oracle CSO Mary Ann Davidson stepped on a landmine when she wrote a post waging war against security researchers and threatening legal action against customers who dare to discover security flaws in Oracle software.

When will we actually be able to say ‘hello’ to Windows Hello?

When will we actually be able to say ‘hello’ to Windows Hello?

Windows 10 comes with Windows Hello authentication to provide better security, but few users have the hardware required to log in using facial recognition, iris scanning, or fingerprint scanning.

Just get rid of Java finally

Just get rid of Java finally

The latest security update from Oracle fixed 25 vulnerabilities in Java, including a zero-day flaw being actively exploited in the wild. It's time to just get rid of Java on the client unless it's absolutely essential.

Behind the curtain of the Hacking Team hack

Behind the curtain of the Hacking Team hack

Hacking Team has been embarrassed publicly by the hack that leaked 400GB of internal data, but beneath the surface it's not all that different from a lot of security vendors out there.

Reports suggest Trump Hotel chain credit card breach

Reports suggest Trump Hotel chain credit card breach

A pattern of fraudulent credit card activity seems to point to a breach at the Trump Hotel Collection chain.

Load More
Top Blog Posts