Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

security id management bouncer

The secret to a successful identity provider deployment: federate your identity data with a hub

From a diverse, distributed identity infrastructure to better SSO and finer-grained authorization

Sophos synchronizes endpoint, network security

Sophos Security Heartbeat endpoint software and the firm’s new XG Firewall detect threats, remediate problems.

defenses against super attackes 1

6 super-defenses against super-user attacks

Review: Privileged Identity Management from BeyondTrust, CyberArk, Lieberman Software, NetIQ, Centrify and Viewfinity.

cancelling an it project

Intel Security will discontinue McAfee SaaS products

Some products will be replaced, but admins will need to start over for setup and configuration

credit cards

Feud heats up over chip cards, FBI warning

A National Retail Federation attorney said that an updated FBI warning on chip card vulnerabilities waters down the need for PIN security.

eset wallpaper

Critical flaw in ESET products shows why spy groups are interested in antivirus programs

The flaw could allow attackers to fully compromise systems via websites, email, USB drives and other methods.

How to use a smart chip card

Some users will 'kick and scream' at paying with slower chip cards

Major U.S. banks have been rolling out new, secure smart chip debit and credit cards for months, but the real end-user impact hasn't yet been felt.

Startup takes the effort out of endpoint detection and response

Startup Red Canary is offering an endpoint detection and response service based in the cloud that is backed up by a team of analysts who weed out false alarms.

LightCyber rolls out new features for endpoint malware detection platform

LightCyber, another security startup with the roots in the Israeli military, has opened its doors in the U.S. to make its mark in the crowded field of endpoint detection and remediation.

laptop in chains

Endpoint security trends for 2015: What can we expect?

In my data center work experience, a very significant percentage of the major network vulnerabilites I've had to fix were caused by the introduction of poorly secured computers. It's a surprisingly common blunder.

6 DNS services protect against malware and other unwanted content

A good DNS service can protect users from a variety of unwanted Web intruders, including phishing sites and botnets. We look at six of them.

Ransomware Criminals Turn to Virus Technique to Spread Infection

Viruses ride again in VirRansom malware

Startup promises to catch 100% of network attacks with unique detection technology

First version of TrustPipe security software aimed at Microsoft Windows XP users.

Palo Alto says its new endpoint protection tool can stop the bad stuff in its tracks

The problem with signature based security tools is you are vulnerable until the signature is released and distributed. Palo Alto takes a different approach with Traps, so Network World Editor in Chief John Dix tracked down Palo Alto...

Yahoo says attackers looking for Shellshock found a different bug

Yahoo said Monday it has fixed a bug that was mistaken for the Shellshock flaw, but no user data was affected.

Tools for creating malicious USB thumb drives released by security researchers

In a gambit aimed at driving manufacturers to beef up protections for USB flash drive firmware, two security researchers have released a collection of tools that can be used to turn those drives into silent malware installers.

Home Depot breach put 56 million payment cards at risk, company says

The breach of Home Depot's payment systems may have compromised 56 million payment cards as a result of malware that has since been eliminated, the company said Thursday.

Adobe releases previously delayed security updates for Reader and Acrobat

After a one-week delay, Adobe Systems has released security updates for its Reader and Acrobat products to patch critical vulnerabilities that could lead to computers being compromised.

Cyberespionage group starts using new Mac OS X backdoor program

A group of hackers known for past cyberespionage attacks against the U.S. Defense Industrial Base, as well as companies from the electronics and engineering sectors, has recently started using a backdoor program to target Mac OS X...

Apple blames leaked nude celebrity photos on 'targeted attack'

A targeted attack focused on user names, passwords and security questions of Apple accounts gave hackers access to nude photos of celebrities that were then leaked over the weekend on the Internet, the company said Tuesday.

Load More