Internet Security

Internet Security | News, how-tos, features, reviews, and videos

vintage robot toys windup

New ad-fraud botnet targets major corporations, universities

A new botnet is specifically targeting large corporations, taking over user machines to generate high-value ad fraud, according to a new report from Pixalate.

welding

Exploit kit activity up 75 percent in third quarter 2015

In a sign of the increasing professionalization of the space, exploit kit activity increased 75 percent in the third quarter of this year compared to the same period last year, based on DNS activity, according to the latest edition of...

layered rock bw

The dark side of layered security

Layered security is currently considered a best practice for enterprises, since a single layer of defense against attackers is no longer enough. Sometimes, however, these layers can have unintended consequences and even make a company...

cybersecurity ts

Juniper Networks taps new security CTO

Former Walmart CISO Walker replaces Hoff

Ex-Juniper sibs look to soften up the WAN

Mehta brothers launch SDN start-up Versa Networks

Prep your tech

CSOs demanding more from cybersecurity tech

CSOs and CISOs are becoming more powerful, and their wielding that power to demand more from their technology vendors, to throw out underperforming tech, and to take more risks on new and innovative approaches

automated security defense protection

Cisco buying Lancope for $450M

Network analysis tools bolster Security Everywhere initiative

iran flag

Iranian hackers get tech support on forums

Iranian hackers are targeting Android systems using AndroRat and DroidJack remote-access Trojans, and are getting support from local-language forums

healthcare data cloud

Experts urge caution when putting health data in the cloud

Health care has become a favorite target for criminals, and some medical organizations are reacting by looking at outside providers to keep their data secure. But jumping to the cloud without first taking some precautions can be a...

female cso executive

Report: Infosec women make progress in governance, risk and compliance

Women account for just 10 percent of the information security workforce, a new report shows, but are making progress in governance, risk and compliance jobs.

Don't overdo biometrics, expert warns

Biometric data such as fingerprint scans is being collected too widely and too casually, according to security company Protegrity USA.

Cisco acquires security consultancy

UK-based Portcullis will allow expansion, complement Neohapsis buy

expiration date can

Expired certificates cost businesses $15 million per outage

The average global 5,000 company spends about $15 million to recover from the loss of business due to a certificate outage -- and faces another $25 million in potential compliance impact

diverse group seated in a circular classroom with professor in the middle

Does security awareness training even work?

If even well-educated security experts mess up when it comes to security, can we really educate average employees to be more security aware?

doctor ipad healthcare

Healthcare firms three times more likely to see data breaches

Companies in the healthcare sector are three times more likely to encounter data theft than the average firm, according to a report released this morning

mit stata center

MIT scores worst in cybersecurity

In a new cyber security survey of 485 large colleges and universities, the Massachusetts Institute of Technology came in at the bottom of the list

Is poor software development the biggest cyber threat?

Is the cyber industry over-focused on network security, while applications are the real weak spot?

servers with view

Virtualization doubles the cost of security breach

When a security incident involves virtual machines in either a public or private cloud environment, the recovery costs double compared to that of a traditional environment, according to a new report from Kaspersky Lab.

Tips for protecting your business against cyber extortion

CrytoLocker is malware cyber criminals use to encrypt the contents of a computer until users pay up. But that's only one type of cyber extortion, according to Tim Francis, enterprise cyber lead at insurance company Travelers.

CISOs facing boards need better business, communication skills

As information security becomes a more important topic of interest for corporate boards, CISOs are increasingly asked to step up and brief boards on cyber issues -- which means they need to become better communicators, and have a...

Load More