Security » Features »

  • Google, Amazon push Flash closer to extinction

    Internet users will get some respite from Flash-based attacks since Google and Amazon are stopping Flash ads from displaying

  • Who can stop malware? It starts with advertisers

    Malware masquerading as advertising is a growing problem, and the ad industry must figure out how to weed out scammers from legitimate companies

  • Vidder's Software Defined Perimeter puts tight security around high value assets

    Reducing the surface that needs to be protected to a single application, it's easier to apply very tight controls through Software Defined Perimeter techniques.

  • Agora Dark Web market discovers suspicious activity on servers, pauses operations

    The Agora Dark Web market cited Tor Hidden Services security vulnerabilities that could allow de-anonymization attacks and temporarily shut down operations after discovering suspicious activity on its servers.

  • 4 security metrics that matter

    Today, management demands metrics to get a clearer view of security. Here are four metrics that deliver actionable insight -- and a few others with less value

  • Ashley Madison -- Can it possibly get any worse? (tl;dr: YES)

    The Ashley Madison hack continues to make headlines. Naturally, that's because the news keeps getting worse. Worse for website owners Avid Media Group. And worse for the REAL victims, more importantly -- the people named in the hacked data dump...

  • 9 steps to make you completely anonymous online

    The default state of Internet privacy is a travesty. But if you're willing to work hard, you can experience the next best thing to absolute Internet anonymity

  • MIT researchers create file system guaranteed not to lose data even if a PC crashes

    MIT researchers created the first file system that is 'mathematically guaranteed' not to lose data even when a computer crashes.

  • Google cloud ''loses'' data (sky falling; film at 11)

    Google is sorry to report it's lost some cloud customers' data. Lightning struck four times near its St. Ghislain, Belgium data center. From cloud to cloud, as't were, causing some storage to go bye-bye...

  • Jump paywalls, score academic research for free, share it without being busted

    At the Chaos Computer Club's Chaos Communication Camp, one brave soul explained how to jump paywalls, obtain academic research and freely share that research without being arrested.

  • Hackers call Time on Ashley Madison -- with huge data dump

    Ashley Madison hackers released the site's user data, as threatened. Or, at least, that's what they say they've done. But it's likely that much of the data is forged or bogus in some way...

  • Akamai: The Internet's aging protocols make juicy targets

    The latest wave of Internet attacks doesn't just involve regular exploits like cross-site scripting, but also leverage aging protocols with enough volume to jam up Internet backbone routers

  • 10 years on: 5 big changes to computer security

    In the 10 years since Security Adviser debuted, the threats have changed -- as have the defenses, and no one can argue computer security is safer overall

  • Hack to steal cars with keyless ignition: Volkswagen spent 2 years hiding flaw

    126 types of cars have been hackable for years and can be stolen thanks to a keyless security flaw; Volkswagen spent two years suing the researchers and trying to keep the vulnerabilities a secret.

  • At what point do white hat hackers cross the ethical line?

    In recent months the news of Chris Roberts alleged hacking of an inflight entertainment system and possibly other parts of the Boeing 737 have sparked a wave of controversy. Public opinion was originally on Roberts' side, but the recent publication of the FBI affidavit changed that drastically. According to the affidavit, Roberts admitted to doing a live "pen-test" of a plane network in mid-air.

  • Hacking Team gives us incontrovertible proof of targeted mobile threats

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

  • The six pillars of Next Generation Endpoint Protection

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

  • Web Real Time Communication (WebRTC) applications emerge as the tech stabilizes

    Perhaps the single-most significant standards based technological advancement in the field of unified communications over the past year has been the completion of Web Real Time Communication (WebRTC) standard and the appearance of several WebRTC based implementations.

  • The top 10 supercomputers in the world, 20 years ago

    In 1995, the top-grossing film in the U.S. was Batman Forever. (Val Kilmer as Batman, Jim Carrey as the Riddler, Tommy Lee Jones as Two-Face. Yeah.) The L.A. Rams were moving back to St. Louis, and Michael Jordan was moving back to the Bulls. Violence was rife in the Balkans. The O.J. trial happened.

  • Network analysis is like turning over rocks

    I just found out my company's employees have been finding ways to get around my Web filtering. And that came as a surprise, because I use a best-in-class product that employs a database to categorize and block website URLs, which I thought I could rely on. But as I found out, that product is not perfect.