security

security - News, Features, and Slideshows

Tutorials

  • Closing the security loop with automated incident response

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • Breach detection: Five fatal flaws and how to avoid them

    IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization's attack surface, which has changed dramatically due to the cloud, mobility, BYOD, and other advances in corporate computing that have caused fundamental shifts in network architecture and operations.

  • Digging Deeper into the Cisco ASA Firewall REST API

    Security orchestration methods and of course SDN is driving the need for programmable interfaces in  security products.  The Cisco ASA Firewall added a REST API back in December with the 9.3(2) code release.  I've asked Mason Harris, from Cisco, to write up a quick how-to primer on the ASA API capabilities.  Thank you Mason for the great information.

  • FREAK attack: How to keep your code secure

    Bill Weinberg, Senior Director, Open Source Strategy, Black Duck Software

  • Doxxing defense: Remove your personal info from data brokers

    Many women gamers and developers, as well as those who support them, havelately come under attack from online trolls. A common intimidation tactic that trolls use is "doxxing," or publicly exposing their targets' personal details, including home address, phone number and even financial records.

  • How to protect yourself against privileged user abuse

    The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.

  • Open source FreeOTFE encrypts disks handily

    FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.

  • BlackBerry 6: Wipe Your Smartphone, Restore Factory Settings

    Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry for a new one from your wireless carrier; you and a friend are swapping devices; you loaded too many applications or media and just want to start over from scratch; etc.

  • Record patch Tuesday: What you need to know

    Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.

  • How to check if your password was exposed in Gawker hack

    A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.

  • Firesheep, Blacksheep, and protecting your Wi-Fi data

    Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.

  • The 25 Worst High-Tech Habits (and How to Fix Them)

    Good citizens of technological America, this story is not for you.

  • Am I mailing spam?

    Tami asked the Antivirus & Security Software forum why friends are receiving spam that appears to come from her.

  • iTunes scam: How to protect yourself

    In recent weeks, more and more iTunes users have been reporting fraudulent activity on their Apple accounts, reporting hundreds or even thousands of dollars worth of bogus purchases. With the reports of this type of fraud on the uptick in recent weeks, many users have been quick to blame Apple or PayPal, as many of the affected iTunes accounts were linked to PayPal accounts.

  • Run multiple security software products

    QUESTION: I've been told that I shouldn't have more than one antivirus program running on my PC. Can I use both McAfee and Microsoft Anti-Spyware (or another spyware application), for example? I want to be extra safe online, and I know that security suites are often good in some areas but not in all. Is there a list that will tell me what I can and can't use together?

CIO
ARN
Techworld
CMO