VIDEO: Power Fingerprinting's founder details innovative technology that uses side-channel analysis to detect attacks.
The FBI and Internet Crime Complaint Center warns of a very profitable spam campaign that has already claimed more than 2,000 victims globally.
The company is working on software that will identify users most vulnerable to attacks and scams and send customized warning messages to them.
The platform employs a layered approach to security that sits closer to assets within the network, segmenting and preventing breaches from spreading.
Microsoft Ventures and its partners graduate 11 new companies that are fighting evolving cyber-security threats and helping to advance medical technology.
In a continuing effort to secure hundreds of millions of users, WordPress.com is disconnecting self-hosted sites that haven't updated the Jetpack add-on.
Dell is upgrading its InTrust software to version 11.0 with the promise of faster discovery and audit capabilities.
A researcher discovers that a variant of the Angler attack tool uses three exploits for Adobe Flash, including one that infiltrates via a previously unknown flaw.
There is no shortage of security-focused Linux distributions on the market, and among them is Pentoo Linux. While some security-focused Linux distributions concentrate on privacy, like Tails, others like Kali Linux and Pentoo focus on security research, providing tools that enable research and penetration testing. Pentoo Linux differentiates itself from other security Linux distributions in a number of ways. The primary difference is the fact that Pentoo is based on Gentoo Linux, which is a source-based Linux distribution that uses the Portage package-management system. Gentoo has capabilities known as "Hardened Gentoo," which Pentoo also inherits, providing users with additional security configuration and control for the Linux distribution itself. Pentoo 2015 RC 3.7 was released Jan. 5, providing updated tools and features. Among the new features is the integrated ability to verify that the distribution files have not been corrupted. Pentoo provides many applications for security analysis, including wireless, database, exploit, cracking and forensic tools. In this slide show, eWEEK looks at key features and tools in the Pentoo 2015 RC3.7 release.
Despite documents showing the U.S. National Security Agency has infiltrated North Korean networks, security experts continue to doubt the country orchestrated the cyber-attack on Sony Pictures.
Oracle fixes security flaws across its software portfolio, including ones in its database, e-business suite, Solaris and Java.
NEWS ANALYSIS: Businesses in the U.S. can expect to start seeing significantly more cards with EMV chips in 2015, but that doesn't mean progress is steady.
Java vulnerabilities were down in 2014, but spam made a big comeback as the security arms race continues, according to Cisco's 2015 Annual Security Report.
The new effort will extend Ubuntu's Snappy Linux technology to help enable the Internet of things.
NEWS ANALYSIS: The rumor that Samsung was offering to buy BlackBerry has been shot down by both companies, but perhaps it's not Samsung that's doing the buying.