attack surface

How ADAssessor Brings Visibility to AD Attack Surfaces

Effectively securing and protecting Active Directory (AD) is an undeniable best practice for businesses today. Especially since some 90% of the world’s enterprise organizations...

Illumio Launching Effort to Reduce Data Center Attack Surface

When it comes to protecting data centers against security threats, it's important to not only know what the threats are, but also where weaknesses...

Ixia Aims to Protect Enterprises by Reducing Attack Surfaces

The Internet is a vast, largely open global network, but it doesn't always have to be that way, especially when it comes to security....

Automotive Attack Surfaces: Where Cars Are at Risk

LAS VEGAS—Among the most anticipated talks at the Black Hat USA 2014 conference here was one on automotive hacking by security researchers Charlie Miller...

More Mac Ransomware Sure to Surface Despite Halt to First Attack

The first try at creating ransomware for the Macintosh was a bust, according to a spokesperson at Apple who told eWEEK that the company...

Adobe Investigates Security Vulnerability as Attack Code Surfaces

Adobe Systems is investigating reports of a new security vulnerability affecting its Illustrator software.Proof-of-concept code for an attack was publicized this week and is...

SMS Fix for iPhone Available, Needs to Be Deployed Before Attacks Surface

Responding quickly to the SMS-based vulnerability to the iPhone demonstrated this week at the Black Hat conference in Las Vegas and first revealed earlier...

Microsoft Urges Organizations to Patch Server Vulnerability as New Attacks Surface

Microsoft advised organizations yet again to deploy the patch for a flaw affecting the Windows Server service that was fixed in October.The latest attacks...

How Deception Technology Can Paralyze Attackers

Multiple types of cybersecurity solutions are necessary to defeat sophisticated criminals, but there’s a significant drawback with many conventional security tools. Often, these tools...

Ransomware Attacks Decline as Cryptojacking Grows, IBM X-Force Reports

While ransomware is still a risk, it's not the primary attack vector used by hackers to make money, according to IBM.The 2019 IBM X-Force...

Concern Rises About Cyber-Attacks Physically Damaging Industries

In March, U.S. agencies warned that Russia government actors were targeting U.S. critical infrastructure in widespread attacks aimed at securing a foothold in the...

NYC Terror Attack Sidetracks Senate Social Media Hearing

Hey there, here are your top news stories from eWEEK. Today’s topics include news of Tuesday’s New York City terror attack changing the focus...

CCleaner Cyber-Attack Hit Telecoms, Network Hardware Companies Hardest

Today’s topics include findings that the CCleaner attack targeted makers of networking equipment and enterprise software; Facebook dropping a new stock plan that would...

Copycat Malware Could Be the Harbinger of Even Worse Cyber-Attacks

At first glance the Copycat malware doesn’t seem like a huge threat to end users. Its primary purpose is to make money by reporting...

Weak Development Security Exposes Web Apps to Cyber-Attacks

Developers continue to leave the vast majority of Web applications open to attack by leaving behind unused code, working with vulnerable third-party libraries and...

Most Popular Articles

Rethinking Customer Experience in Post-Pandemic Era

Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...

IBM Storage: Squeezing Enterprise Value into Smaller...

The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...

How Box Brings Value-Adds to Enterprise Collaboration

It’s fair to say the COVID-19 pandemic has changed the world in ways we could never have imagined. In-store shopping has been replaced with...

#eWEEKchat Feb. 9: Down the Batch: Trends...

On Tuesday, Feb. 9, at 11 a.m. PST/2 p.m. EST/7 p.m. GMT, @eWEEKNews will host its 95th monthly #eWEEKchat. The topic will be "Down...

Top Data Center Switch Companies

The data network was once an IT resource to which few business leaders paid attention. Most people simply considered the network to be the...