Security News & Reviews - Page 2

More Security News

Chrome Cleanup Tool

Google Removes 89 Malicious Brower Extensions From Chrome Web Store

|
It has also disabled the extensions from running on more than 400,000 impacted systems after Trend Micro discovered the issue.
Mixed Cloud Security

7 Steps Administrators Should Take to Secure Mixed Cloud Environments

|
Enterprises today generally are not all-cloud or no-cloud, but stuck somewhere in between. Securing these mixed environments is difficult. Here are some recommended steps.
Pwn2Own 2017 2

Pwn2Own 2018 Expands Targets and Raises Prize Pool to $2M

|
For the first time at Pwn2Own, security researchers will take aim at Oracle's VirtualBox, as well as the open-source Nginx web server in attempts to reveal zero-day vulnerabilities.
1088_FightOffIntruders

Improving Cyber-Security Hygiene: Nine Methods to Fight Off Intruders SLIDESHOW

|
Breaches caused by compromised passwords continue to wreak havoc on businesses. But there are a number of steps organizations can take to help prevent cyber-intrusions.
ICS Security Threats

Threats to Industrial Control Systems Grow as Vulnerabilities Increase

|
NEWS ANALYSIS: A study by enterprise security company Positive Technologies found that the number of unprotected industrial control devices continues to grow each year offering a clear path for cyber-attackers.
SonicWall network security

SonicWall Advances Endpoint Protection; Introduces Virtual Firewall

|
Included among the new products now in beta test is the SonicWall Capture Client that is powered by technology from endpoint security vendor SentinelOne.
AV-TEST Meltdown Spectre

Meltdown, Spectre Malware Samples Emerge, Though Few Attacks Follow

|
Four weeks after critical CPU vulnerabilities were first publicly disclosed, security vendors aren't currently seeing any widespread attacks.
Monero XMRig

Cisco Reveals the Economics of Crypto-Currency Mining Attacks

|
A detailed report from the Cisco Talos research team provides insights into the methods used by attackers to generate profits with unauthorized crypto-currency mining campaigns.
StackRox

StackRox Improves Container Security With Adversarial Intent Model

|
StackRox's Adversarial Intent Model (AIM) provides insight into how container attacks occur and what needs to be done to stop them.
1088_CyberFundBoost

10 Cyber-Security Startups Get Funding to Advance Their Work SLIDESHOW

|
The new year starts off with investors continuing to find opportunities in the growing cyber-security market, investing in such areas as cryptocurrency wallet security and real-time forensics.
biometric analysis

Millennials Likely to Use Biometrics for Authentication, IBM Finds

|
IBM Security report reveals differences in the way millennials use authentication technologies that could impact the future of digital identities.
1088_DDoSAttack

Peak DDoS Attack Volume Declines to 600G bps in 2017, Arbor Reports SLIDESHOW

|
Arbor Networks' 13th annual Worldwide Infrastructure Security Report reveals a decline in peak DDoS attack size, but that doesn't mean attackers weren't active in 2017.

Enterprise Tech Videos