Security News & Reviews - Page 2

More Security News

Chrome Cleanup Tool

Google Removes 89 Malicious Brower Extensions From Chrome Web Store

It has also disabled the extensions from running on more than 400,000 impacted systems after Trend Micro discovered the issue.
Mixed Cloud Security

7 Steps Administrators Should Take to Secure Mixed Cloud Environments

Enterprises today generally are not all-cloud or no-cloud, but stuck somewhere in between. Securing these mixed environments is difficult. Here are some recommended steps.
Pwn2Own 2017 2

Pwn2Own 2018 Expands Targets and Raises Prize Pool to $2M

For the first time at Pwn2Own, security researchers will take aim at Oracle's VirtualBox, as well as the open-source Nginx web server in attempts to reveal zero-day vulnerabilities.

Improving Cyber-Security Hygiene: Nine Methods to Fight Off Intruders SLIDESHOW

Breaches caused by compromised passwords continue to wreak havoc on businesses. But there are a number of steps organizations can take to help prevent cyber-intrusions.
ICS Security Threats

Threats to Industrial Control Systems Grow as Vulnerabilities Increase

NEWS ANALYSIS: A study by enterprise security company Positive Technologies found that the number of unprotected industrial control devices continues to grow each year offering a clear path for cyber-attackers.
SonicWall network security

SonicWall Advances Endpoint Protection; Introduces Virtual Firewall

Included among the new products now in beta test is the SonicWall Capture Client that is powered by technology from endpoint security vendor SentinelOne.
AV-TEST Meltdown Spectre

Meltdown, Spectre Malware Samples Emerge, Though Few Attacks Follow

Four weeks after critical CPU vulnerabilities were first publicly disclosed, security vendors aren't currently seeing any widespread attacks.
Monero XMRig

Cisco Reveals the Economics of Crypto-Currency Mining Attacks

A detailed report from the Cisco Talos research team provides insights into the methods used by attackers to generate profits with unauthorized crypto-currency mining campaigns.

StackRox Improves Container Security With Adversarial Intent Model

StackRox's Adversarial Intent Model (AIM) provides insight into how container attacks occur and what needs to be done to stop them.

10 Cyber-Security Startups Get Funding to Advance Their Work SLIDESHOW

The new year starts off with investors continuing to find opportunities in the growing cyber-security market, investing in such areas as cryptocurrency wallet security and real-time forensics.
biometric analysis

Millennials Likely to Use Biometrics for Authentication, IBM Finds

IBM Security report reveals differences in the way millennials use authentication technologies that could impact the future of digital identities.

Peak DDoS Attack Volume Declines to 600G bps in 2017, Arbor Reports SLIDESHOW

Arbor Networks' 13th annual Worldwide Infrastructure Security Report reveals a decline in peak DDoS attack size, but that doesn't mean attackers weren't active in 2017.

Enterprise Tech Videos