Recent Features

Look beyond BYOD

Whether officially permitted or not, employees are using personally-owned smart phones, tablets, and PCs for work. A study by Gartner last year found that 57% ...

Rapid Cybersecurity Risk Assessments

Businesses and governments alike are struggling to effectively protect information systems from cyber-attack. The theory appears sound: We conduct risks assessment, identify areas of risk ...

Apple releases iOS 7.1 to address multiple security issues

On Monday Apple released iOS 7.1 to address a number of security issues. The update is now available through iTunes and Software Update on iOS devices. ...

C-13: Who’s the bully?

Bill C-13 is being promoted by the Conservatives as addressing cyber-bulling, but it is much more about the Harper government bullying Canadians into giving up ...

Adobe Releases Security Update for Adobe Shockwave Player

Adobe has released a security update to address a vulnerability in Adobe Shockwave Player 12.0.7.148 and earlier versions for Windows and Macintosh operating systems.

All featured articles »

Latest Cybersecurity News

FOUR DAYS: that’s how long it took to crack Galaxy S5 biometrics

Sammy’s newbie cooked slower than iPhone, also costs more to build: The much-hyped fingerprint scanner on Samsungs latest flagship handset the Galaxy S5 has already ...

Oracle working on at least 13 Heartbleed fixes

Big Red’s cloud is safe and Oracle Linux 6 has been patched, but Java has some issues: Oracle has emitted its formal advice about Heartbleed, ...

eWEEKChat April 23: New-Gen Fabrics, Software-Defined Networking: Removing Old Roadblocks

On April 23, at 11 a.m. PST/2 p.m. EST/7 p.m. GMT, @eWEEKnews will host a special eWEEKChat event, our 19th, on new-gen networking. Plan to ...

Pentagon to triple its security workforce by 2016

Defense Secretary Chuck Hagel recently announced the recruitment efforts during a speech in Fort Meade, Md.

The Heartbleed bug works, and could be a scapegoat for older breaches

Researchers proved the Heartbleed bug was real in a challenge issued by CloudFlare to prove private keys can be stolen, right around the time companies ...

Feds to roll out face recognition database by summer

The Next Generation Identification database currently has more than 16 million face images, and is expected to house more than 52 million images by next ...

Eugene Kaspersky: Ukraine conflict hurts enterprise security

With governments occupied, criminals could capitalize: As governments around the world continue to wrangle for a peaceful solution to the political tensions in the Ukraine, ...

Kaspersky’s Security for Virtualization pushed to XenServer and HyperV

Platform looks to slim down security protections in virtual instances: Kaspersky is extending its Security for Virtualuzation Light Agent security tool to the Citrix XenServer ...

Tech manufacturer’s online payment system breached

LaCie confirmed an unauthorized party used malware to access its online payment system for almost a year and could have stolen customer information.

Hacker Underground: How Markets for Cyber-Tools, Stolen Data Work

Cyber-criminals, hacking tools and black marketplaces have spawned an entirely new economy: a deep and complex underground one of its own.

Tom Ridge: Private sector lagging in cybersecurity

Former US Homeland Security boss scorns enterprise security efforts: Poor communications, weak management and a lack of communications with government agencies is leaving many large ...

UK cosmetic surgery group extorted by hacker that stole data on 500K

An attacker stole information on 500,000 individuals that submitted inquiries on the Harley Medical Group website, and then attempted to extort the UK-based cosmetic surgery ...

More Cybersecurity News