NEWS ANALYSIS: Privacy, bandwidth and money have all been lost due to the Heartbleed bug. The full implications are, as yet, unknown.
VIDEO: Mike Fey, CTO of Intel Security, discusses how McAfee is now stronger, thanks to Intel.
Almost 20 percent of respondents raised the issue of poor communication among key stakeholders across development, security and operations groups.
Heartbleed Detector, a Chrome browser plug-in and an Android mobile app, are accessible in the Chrome Web Store and Google Play app store.
Security firm Pindrop finds a phone fraud ring that may have targeted more than 450,000 people, mostly immigrants and foreign nationals, in attempts to extort phony tax payments.
General Mills says it treats customers' information sensitively. But what about their rights?
NEWS ANALYSIS: Though experts are still assessing the full impact of Heartbleed, police in Canada made the first arrest related to the SSL encryption flaw.
Upgrades include expanded hosted email security for protection of Microsoft Office365 deployments and browser exploit detection.
There are a number of high-profile security firms in the IT industry, though few have generated as many headlines as FireEye in recent years. One of the big reasons for FireEye's notoriety is the company's $1 billion acquisition of security firm Mandiant earlier this year. The acquisition price might seem like a high one to pay for Mandiant, but it's one that the FireEye board of directors, which includes former Symantec CEO Enrique Salem, thought was fair given the market opportunity. Mandiant, led by charismatic Kevin Mandia, jumped into the public consciousness in February 2013 when it released its APT1 report on a covert Chinese army hacking unit. In a new Mandiant M-Trends "Beyond the Breach" report released on April 10, Mandiant provides insight into the current status of the Chinese APT1 threat and how it has changed over the course of the last year. The report also provides insight into the overall threat landscape, providing visibility on the industries that are being attacked. In 2013, Mandiant found an increasing number of attacks against financial services firms as well as media and entertainment companies. In this slide show, eWEEK examines some surprising trends from the Mandiant M-Trends report.
Tens of millions of Android 4.1 "Jelly Bean" users are still at risk from the flaw that continues to vex Websites around the globe.
On April 23, at 11 a.m. PDT/2 p.m. EDT/7 p.m. GMT, @eWEEKnews will host a special eWEEKChat event, our 19th, on new-gen networking. Plan to join us.
Cyber-attacks continue to grow in number as well as become more sophisticated. Enterprises' intellectual property and brand reputation can evaporate in a heartbleed (um, heartbeat—sorry, couldn't resist), and our personal information is targeted daily. During the last decade, cyber-criminals, hacking tools and black marketplaces have become more sophisticated and spawned an entirely new economy: a deep and complex underground one of its own. It includes storefronts, cloud services, criminal services for sale and even training on how to conduct cyber-attacks. A new report by RAND, sponsored by Juniper Networks, titled "Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar," provides analysis of how these markets function, how they are composed, historical trends and projections for the future. While some refer to these markets as the cyber underground, Juniper likens it more to a thriving metropolis. This eWEEK slide show examines the diverse facets that make up this new metropolis.
According to a report, executives are considering the move as part of their larger plan to cut expenses and increase shareholder returns.
This year's Mandiant M-Trends report found that phishing emails largely look to capitalize on trust in IT departments by impersonating those targeted IT departments.
NEWS ANALYSIS: The OpenSSL Software Foundation is now asking for money to help fund its efforts. Will it make a difference or is a different model needed?