Security News & Reviews - Page 4
More Security News
NEWS ANALYSIS: Massive data breaches destroyed people's faith the security of their personal information while it ruined the careers of senior IT executives along with the reputations of giant corporations.
A lot of money poured into cyber-security startups over the course of 2017, as venture capitalists look beyond data breaches to find financial opportunities.
Hackers have released the exploit code for Huawei router vulnerability that helped to enable the Satori IoT botnet.
Millions of unsecure, Internet-enabled devices provide new threat surfaces that security operations experts will have to defend.
Most of Microsoft's employees are using Windows Hello, the company's biometric technology, to log into their PCs as the company seeks to serve as an example to all Windows PC users.
DAILY VIDEO: Digmine cryptocurrency miner spreads via Facebook Messenger; Whitehouse.gov moves from Drupal to WordPress in a CMS shift; and there's more.
In 2018, we can expect that these attacks are only going to become more frequent and intense. Operations security (OPSEC) specialists in the know are putting this type of breach at or near the top of their priority lists.
NEWS ANALYSIS: If devices are connected to the internet and accessible without any authentication, bad things could happen.
UPDATED NEWS ANALYSIS: Malware has always been about destruction, either real or threatened, as a way to accomplish the goals of its creator. But that’s changed with crypto-currency mining malware.
Boundless Server features a flexible architecture that enables enterprises to reliably publish a range of data and workflows to web apps, desktop clients or mobile devices.
There's now yet another way that hackers are getting cryptocurrency mining code running on end-user systems.
A number of cyber-security vendors secured new funding in December 2017, among them cloud and IoT security vendors.