Microsoft verging on single OS across all devices
Microsoft seems on the brink of announcing a major enhancement to its operating system lines, namely merging them into a single OS that could bring big benefits for corporate users.The next version of...
View ArticleBlack Hat 2014: How to crack just about everything
How to crack just about everything As the world’s best security experts prepare to descend on Black Hat USA 2014, they must be rubbing their hands in anticipation of colleague’s upcoming revelations...
View ArticleRay Ozzie's Talko app stores calls in cloud, lets you search them
Ray Ozzie -- the father of Lotus Notes -- has launched Talko, a smartphone app that records group phone calls, stores them, and makes them searchable so group members can go back and listen to key...
View ArticleSay goodbye to Microsoft Lync, hello to Skype for Business
Microsoft is upgrading its Lync unified communication platform to look and feel more like the familiar consumer version of Skype and changing its name to Skype for Business.By the middle of next year...
View ArticleGartner: Makers of things for Internet of things undervalue security
As the Internet of things develops, most vendors that are making these things don't make security their top priority, allowing business considerations to take precedent, according to a Gartner...
View Article10 security startups to watch in 2015
A wealth of young security companies is trying to capitalize on businesses moving toward security platforms that help them respond more quickly when they suffer successful cyber attacks in hopes of...
View ArticleWindows 10 embraces iris scans, facial recognition
Microsoft is embracing biometric login with a new feature of Windows 10 that can recognize faces, fingerprints, and irises for authentication it claims is more secure than passwords.Windows Hello can...
View ArticleSchneier on ‘really bad’ IoT security: ‘It’s going to come crashing down’
Security expert Bruce Schneier has looked at and written about difficulties the Internet of Things presents -- such as the fact that the "things" are by and large insecure and enable unwanted...
View ArticleRSA chief to security pros: Stop addressing the wrong problems
IT pros need to stop using old frameworks for addressing security and deal with today's reality because the old view of security is no longer useful, attendees at the RSA Conference 2015 in Las Vegas...
View ArticleStartup touts safe sharing of Office 365 documents
Startup Vera promises to secure Microsoft Office 365 documents no matter where they go using policies set by the businesses that create them.The company lets users restrict access to individual...
View Article7 things to do when your business is hacked
The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in place well before attackers got through the...
View ArticleIBM finds another Android phone bug
IBM security researchers have found a way to exploit an Android flaw that puts more than 55 percent of Android phones at risk of being taken over by persistent attackers.By exploiting a weakness it...
View Article10 more security startups to watch
The emergence of cyber security startups has continued unabated as entrepreneurs vie for corporate customers seeking new technologies to battle ever increasing and innovative attackers.The expertise...
View ArticleCisco: Flash exploits are soaring
Cisco is reporting that successful exploits of Flash vulnerabilities are soaring, partly because they are rapidly being incorporated in kits that take advantage of the flaws as well as because...
View ArticleWhy corporate security pros should care about the Ashley Madison breach
Corporate security executives should have a professional interest in the Ashley Madison breach because publicly posted data about its customers represents a fertile field for spear phishers trying to...
View ArticleObama advisors: Encryption backdoors would hurt cyber security, Net...
Making encryption backdoors available to law enforcement would be bad for cyber security in general and hurt vendors that make encryption gear, a presidential advisory group says. While the FBI argues...
View ArticleChina reportedly tries to hack U.S. businesses the day after agreeing not to
Chinese hackers have gone after seven U.S. tech and pharmaceutical companies since the presidents of both countries agreed not to knowingly carry out corporate espionage, according to security firm...
View ArticleCrypto researchers: Time to use something better than 1,024-bit encryption
It's actually possible for entities with vast computing resources -- such as the NSA and major national governments -- to compromise commonly used Diffie-Hellman key exchange groups, so it's time for...
View ArticleDell computers shipping with potentially dangerous root certificate authority
At least some Dell laptops are shipping with a trusted root certificate authority pre-installed, something that those who discovered the CA are comparing to the Superfish adware installed on Lenovo...
View ArticleThe biggest data breaches of 2015
Big data breaches made big news in 2015 as measured by a variety of criteria that range from the number of records compromised to the types of data stolen to the potential threat to specific groups...
View Article