Researchers found a Web attack tool designed specifically to exploit vulnerabilities in routers and hijack their DNS settings By Lucian...
Information Security
Jeremy Kirk IDG News Service Mar 13, 2015 A Google software problem inadvertently exposed the names, addresses, email addresses and...
Joab Jackson IDG News Service Mar 10, 2015 With the latest Patch Tuesday release, Microsoft is fixing the FREAK vulnerability...
By Joe Schreiber - solutions architect at AlienVault 6th March 2015 Getting breached doesn’t establish whether or not you have...
By Judy Greenwald Home Depot Inc. incurred $33 million of pretax net expenses related to last year's data breach in 2014,...
By Nicole Perlroth February 24, 2015 6:22 pm Lenovo claims it eradicated all traces of Superfish and Komodia from its...
Warwick Ashford Security Editor 23 Feb 2015 13:45 As much as 44% of known breaches in 2014 came from vulnerabilities...
Brad Chacos @BradChacos Feb 21, 2015 6:15 AM 5 days of terror Security’s been in the spotlight ever since Edward...
by Ambareesh Kulkarni, VP, 1E Professional Services, 1E. 1E Professional Services While 2014 was the year of security concerns following...
2015 TOP RISKS: SUPPLY CHAIN, CYBERCRIME, AND MORE! February 13, 2015 · by dridrive · in News. · What kind...