WAN

WAN | News, how-tos, features, reviews, and videos

iPhone TouchID fingerprint biometrics broken by German hacker club

The German hacking group Chaos Computer Club says its biometrics hacking team has discovered how to bypass the biometric security of Apple's TouchID fingerprint authentication through a simple method based on a rubbery duplicate of a...

Java exploits seen as huge menace so far this year

Java was the most targeted development platform for exploit attacks during the first half of the year, and attacks have increasingly shifted to zero-day vulnerabilities, according to F-Secure's new threat report. "Of the top...

Cybercrooks target SMBs with new types of attacks

As money and corporate information have morphed from hard currency and blueprints to digital files, small and midsized businesses have become the new banks to rob

Gartner security survey: McAfee up, Trend Micro down

A Gartner report about the security software market out today shows that No. 2 ranked McAfee enjoyed the most overall growth last year, Trend Micro slipped but stayed No. 3, and Symantec held onto its top spot with 19.6% of the $19.1...

Tip

Smartphones take center stage in two-factor authentication schemes

We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be...

Florida's identity-theft rate dwarfs others

Sure, the headline gives away the answer, but if you had been asked to guess which state has the highest rate of reported identity theft you'd likely have chosen Florida: A large population of vulnerable retirees and a generally high...

Why don't risk management programs work?

When the moderator of a panel discussion at the recent RSA conference asked the audience how many thought their risk management programs were successful, only a handful raised their hands. So Network World Editor in Chief John Dix...

7 steps to securing Java

Java, the popular OS-independent platform and programming language, runs on just about every kind of electronic device imaginable, including computers, cell phones, printers, TVs, DVDs, home security systems, automated teller...

McAfee rethinks consumer security service delivery

McAfee, part of Intel, today announced a profound shift in how it distributes and prices its consumer security products by introducing LiveSafe, a service that combines anti-malware plus a score of other capabilities, such as...

Cisco gets tough: Details ruggedized switches for harsh environments

Cisco, which wants to expand its clout into the industrial networks used by power-generation utilities to support the electric grid, today announced an expansion of its "smart grid" portfolio with ruggedized and low-latency switches...

ESEA gaming client hijacks GPUs for Bitcoin mining

The co-owner of widely used computer gaming service ESEA has admitted that the company used its client software to mine bitcoins using customers hardware without their knowledge. Some ESEA users say that the unannounced activity...

IT supply-chain security standard aims to prevent counterfeits, tampering

The danger of counterfeit and tampered IT products is well known, and to fight it, the Open Group has published a technical security standard aimed at supply-chain safety. It's anticipated that by year-end there will also be an...

Reddit co-founder calls out Google, Twitter, Facebook over CISPA

A co-founder of social news site Reddit has publicly urged the heads of Twitter, Google and Facebook to support efforts to defeat a controversial cyber security bill currently under consideration in Congress. Alexis Ohanian posted a...

Should U.S. limit China-government influenced IT systems?

New federal restrictions now preclude four U.S. agencies from buying information-technology (IT) systems from manufacturers "owned, directed or subsidized by the People's Republic of China" due to national-security concerns. But is...

Google transfers license for 3LM Android security technology to MDM vendor BoxTone

Brian Reed, BoxTone's chief product officer, said the license for the 3LM security technology for Android had been held by the Motorola division related to mobility that was acquired by Google last year. But now Google has...

Report thumping Army for mobile cyber security efforts yanked off DoD website

A report from the Inspector General of the U.S Department of Defense that's critical of the way the Army has handled mobile-device security has been inexplicably yanked from the IG DoD public website but can still be found in the...

Dataguise introduces field-level encryption for Apache Hadoop database

Dataguise says the latest version of its data-protection product enables users to encrypt sensitive data right down to specific fields within an open source Apache Hadoop database. DG for Hadoop 4.3 also makes use of the traditional...

Where do Cisco's network security plans go from here?

Despite its leadership position in most enterprise security product areas, Cisco faces a number of technological and competitive challenges to stay out in front. For example, the overarching security plan Cisco outlined two years ago...

Hackers use corporate attacks as staging grounds for other cyber assaults

Fighting a corporate cyber intrusion is fraught with legal, insurance considerations, panelists at RSA Conference say

RSA: IT security managers skeptical on Big Data Security proposition

"I don't call it Big Data," I call it garbage data," said Jerry Sto. Tomas, director of global information security at healthcare company Allergan, who with other panelists at the RSA Conference this week discussed the challenges...

Load More