Computer Network Security


Ashley Madison Issues Statements

Ashley Madison Issues Statements

Owner of online cheating site Ashley Madison releases a statement about the security breach that leaked user data to an unknown...

Jul 20 2015, 7:45am CDT

China's 'Great Cannon' Lets Internet Censors Hack Sites Abroad

The attacks have the ability to knock out international websites offline...

Apr 10 2015, 1:51pm CDT

MobileIron introduces the First Mobile Content Security Service to secure Enterprise Content in the Personal Cloud

MobileIron introduces the First Mobile Content Security Service to secure Enterprise Content in the Personal Cloud

Phase 2 of MobileIron cloud security initiative is the Content Security Service (CSS) that protect enterprise data in its origi...

Feb 4 2015, 6:02am CST

China's Censorship System ‘Upgrade’ hits VPNs

China's Censorship System ‘Upgrade’ hits VPNs

The move has affected the usage of at least three popular VPN services and attacked others with more vigor than usual....

Jan 23 2015, 12:35pm CST

New EU Rules bound Spyware Companies to get a License before Export

New EU Rules bound Spyware Companies to get a License before Export

According to the new EU rules, companies that make spyware and export them, will need a license from December....

Nov 7 2014, 6:37am CST

China is staging a nationwide attack on iCloud and Microsoft accounts

China is staging a nationwide attack on iCloud and Microsoft accounts

Chinese firewall is blocking all local connections to iCloud.com, redirecting those connections to a dummy site designed to loo...

Oct 20 2014, 11:54pm CDT

Hackers Take Down Destiny and CoD:Ghost Servers

Hackers Take Down Destiny and CoD:Ghost Servers

Lizard Squad claiming responsibility for the weekends attacks....

Sep 21 2014, 9:39pm CDT

The World Needs Google Project Zero to be Real

The World Needs Google Project Zero to be Real

If someone does something altruistic in security most stand up and applaud. But these days, such actions also tend to attract p...

Jul 16 2014, 6:10am CDT

Luuuk Trojan stole over $680,000 in just a Week, then disappeared

Luuuk Trojan stole over $680,000 in just a Week, then disappeared

Luuuk is the name of a mysterious Trojan that was discovered in early 2014 after having allowed its creators to steal more tha...

Jun 26 2014, 1:20am CDT

Top Smartphone Risks

Top Smartphone Risks

The world has reached a technological advancement at monumental levels. This development has aided people, businesses, and life...

Jun 11 2014, 4:28am CDT

Target: A Moment Of Truth Is Just Days Away

Target: A Moment Of Truth Is Just Days Away

On June 11, when Target holds its annual meeting, shareholders will make a decision that could have far-reaching impact beyond...

Jun 4 2014, 8:21am CDT

BlackShades infected 500,000 PCs

BlackShades infected 500,000 PCs

NEW YORK (AP) — More than a half-million computers in over 100 countries were infected by sophisticated malware that lets cyber...

May 20 2014, 5:42am CDT

Hulu attempts to block international viewers using VPNs

Hulu attempts to block international viewers using VPNs

There is no specific blockade as of yet and so far Hulu is only looking out for a certain web addresses...

Apr 26 2014, 1:00pm CDT

NSA reportedly used Heartbleed to gather intelligence, Agency denies it

NSA reportedly used Heartbleed to gather intelligence, Agency denies it

A Bloomberg report earlier today said that the NSA intentionally kept the Heartbleed bug a secret in order to use it as a tool...

Apr 12 2014, 4:36am CDT

The Really Scary Aspect About Heartbleed

The Really Scary Aspect About Heartbleed

Another day, another Internet security crisis. This time it’s a problem with the encryption protocol that many Internet sites u...

Apr 10 2014, 1:45pm CDT

Where Are The US Tech Heroes?

Where Are The US Tech Heroes?

This column first appeared in securitycurrent.com It has been three months since the world learned that the NSA’s Signals Intel...

Apr 7 2014, 9:00am CDT

Tumblr adds two-form authentication option to stop hackers

Tumblr adds two-form authentication option to stop hackers

Tumblr gets new security option...

Mar 25 2014, 2:05pm CDT

Security Statistics Show That We Need To Reinvent Enterprise IT

Often the conversation about the security of technology systems is parsed in terms that suggest the biggest risk vector comes f...

Mar 4 2014, 1:26pm CST

China's president heads cybersecurity body

BEIJING (AP) — Chinese President Xi Jinping has put himself in charge of a new body to coordinate cybersecurity, in a sign of B...

Feb 27 2014, 11:01pm CST

New Virus Spreads Like The Common Cold - Via WiFi

It started in the laboratory of a university in England. An airborne virus was cultivated. One that could spread like the commo...

Feb 26 2014, 11:36am CST

Unofficially Fixing Apple's 'Gotofail' Mess And How To Stay Safe

Many of you by now will have read about the Apple security issues in iOS and Mac OS X. Whilst we all wait patiently for Apple t...

Feb 24 2014, 6:06pm CST

How To Prevent Becoming The Next Target

How To Prevent Becoming The Next Target

Welcome to another installment in my cybersecurity for business owners series. Black Hat held a good webinar today on securing...

Feb 20 2014, 3:06pm CST

SANS Institute Report on Cyberthreat To Healthcare Industry

SANS Institute Report on Cyberthreat To Healthcare Industry

In light of last weeks cyber-attack on Forbes (here), the release of new cyberthreat report yesterday specifically for healthca...

Feb 20 2014, 2:06am CST

SD Elements--A Solution To The Web App Security Conundrum

The idea of web applications seems timeless, web apps have been around for a couple of decades already and yet we still keep he...

Feb 14 2014, 11:10am CST

Former NSA Security Architect Pushes Email Encryption For The Masses

Former NSA Security Architect Pushes Email Encryption For The Masses

Since former NSA contractor Edward Snowden began divulging information on how vulnerable our personal digital data is – and how...

Feb 10 2014, 5:20pm CST

How Secure is Your Health Data?

How Secure is Your Health Data?

By Julie Steele Dr. Andrew Litt, Chief Medical Officer at Dell, made a thoughtful blog post last week about the trade-offs inhe...

Feb 6 2014, 8:10am CST

Secure Your POS and Avoid a Target-Style Disaster

Secure Your POS and Avoid a Target-Style Disaster

An estimated 70 million consumers were affected by a data breach impacting Target’s POS systems over the holidays. For Target,...

Feb 4 2014, 1:02am CST

Get Ready for Your Next Generation Customers--Millennial Man

Survey Shows Most American Execs Are Out of Touch With IT?

Many American executives are out of touch with their IT department, putting them at risk for security issues and data loss. Whe...

Jan 29 2014, 11:50pm CST

7 Israeli Security Companies Capable of Protecting the Sochi Olympics

7 Israeli Security Companies Capable of Protecting the Sochi Olympics

The 22nd Winter Olympics are to be held in short time in Sochi, Russia. The news leading up to one of the world’s greatest spor...

Jan 29 2014, 5:07pm CST

The Target Data Breach Is Becoming A Nightmare

The Target Data Breach Is Becoming A Nightmare

Over the past month, details about the breadth of the Target data breach have continued to emerge.  It’s not a pretty story.  B...

Jan 17 2014, 1:51pm CST

Researchers Report Exact Timeline Of Massive Target Data Breach

Researchers Report Exact Timeline Of Massive Target Data Breach

Following yesterday’s identification by Brian Krebs of the exact malware used in last year’s Target personal data breach, the r...

Jan 17 2014, 9:41am CST

CES 2014 in Las Vegas Highlights: myIDkey Shield portable firewall/proxy and VPN device from Arkami

CES 2014 in Las Vegas Highlights: myIDkey Shield portable firewall/proxy and VPN device from Arkami

CES 2014 in Las Vegas Highlights: myIDkey Shield portable firewall/proxy and VPN device from Arkami...

Jan 14 2014, 11:49am CST

Snapchat vows to fix security issues

Snapchat vows to fix security issues

The popular photo messaging application will be updated soon to address security flaws....

Jan 2 2014, 9:02pm CST

7 Ways To Protect Yourself Against A Data Breach

7 Ways To Protect Yourself Against A Data Breach

As business owners, we know that we could be doing a better job protecting our data.  We should be more responsible, have bette...

Dec 31 2013, 9:16am CST

I4U news

Google's Schmidt Discusses Possible Internet Censorship In Russia,Moving Servers Out Of U.S.

Eric Schmidt, executive chairman of Google, believes Russia might follow China in censoring the Internet. Speaking at the recen...

Dec 30 2013, 12:05am CST

Report: NSA Intercepting Laptops Ordered Online, Installing Spyware

Report: NSA Intercepting Laptops Ordered Online, Installing Spyware

With each new story we hear of the NSA’s spying program, things get a little bit crazier—a little more Hollywood, and a lot mor...

Dec 29 2013, 11:56am CST

The Year Ahead In Cyber Security: What You Need To Know

The Year Ahead In Cyber Security: What You Need To Know

2013 was a watershed year for cyber security and digital secret-keeping. Revelations about the way our data is treated once it...

Dec 22 2013, 9:41am CST

Andre Durand's Ping Identity Wants to Help You Take Control of Your Digital Identity

Andre Durand's Ping Identity Wants to Help You Take Control of Your Digital Identity

A Series of Forbes Insights Profiles of Thought Leaders Changing the Business Landscape: Andre Durand, Founder and CEO, Ping Id...

Dec 20 2013, 10:26am CST