Top Stores (US Sources)

» Auto updated continuously

• Source limited to: IT World

 2020-07-07 10:00 

IT World

California Consumer Privacy Act (CCPA): What you need to know to be compliant...

In late June, 2018, California passed a consumer privacy act , AB 375, that could have more repercussions on U.S. companies than the European Union's General Data Protection Regulation (GDPR) that went into effect this past spring. The California law ...

 2020-07-02 10:00 

IT World

DDoS explained: How distributed denial of service attacks are evolving...

What is a DDoS attack? A distributed denial of service (DDoS) attack is when an attacker, or attackers, attempt to make it impossible for a service to be delivered. This can be achieved by thwarting access to virtually anything: servers, devices, services...

 2020-06-12 10:00 

IT World

General Data Protection Regulation (GDPR): What you need to know to stay compliant...

Companies that collect data on citizens in European Union (EU) countriesl need to comply with strict new rules around protecting customer data. The General Data Protection Regulation (GDPR) sets a new standard for consumer rights regarding their data, but...

 2020-06-11 10:00 

IT World

Which tech companies will survive the pandemic-triggered recession?...

COVID-19 has become part of practically every news story. There's hardly any precedent for this level of coverage. It has saturated every pore of people's consciousness and impacted lives in a way that rivals war. Building a predictive model to fo...

 2020-06-11 07:00 

IT World

Enterprise internet attack surface is growing, report shows...

The attack surface of large enterprises has grown in recent months driven by the new work conditions imposed by the COVID-19 pandemic. The threat has increased in many areas including servers that are directly accessible from the internet, domain names, w...

 2020-06-04 10:00 

IT World

What is pretexting? Definition, examples and prevention...

Pretexting definition Pretexting is form of social engineering in which an attacker tries to convince a victim to give up valuable information or access to a service or system. The distinguishing feature of this kind of attack is that the scam artists com...

 2020-06-03 10:00 

IT World

Spring 2020: CISO rising...

Welcome to the Summer 2020 digital issue of CSO, featuring winners of our CSO50 awards and Hall of Fame honorees. In these pages, we take a deep dive into the evolving role of the CISO, including the areas where they are taking on new responsibilities, th...

 2020-06-03 10:00 

IT World

The ultimate guide to privacy on Android...

On the surface, Android and privacy might not seem like the most natural of bedfellows. Google is known for its advertising business, after all — it's how the company makes the lion's share of its money — and it can be tough to square ...

 2020-06-02 18:09 

IT World

Cisco warns of Nexus switch security weakness...

Cisco is telling customers of its Nexus core data-center switches to fix or work around a vulnerability that could leave the boxes open to a denial of service attack. The vulnerability, found in the Nexus NS-OS software gets a 8.6 score out of 10 on the C...

 2020-05-27 10:00 

IT World

How to go incognito in Chrome, Edge, Firefox and Safari...

Private browsing. Incognito. Privacy mode. Web browser functions like those trace their roots back more than a decade, and the feature — first found in a top browser in 2005 — spread quickly as one copied another, made tweaks and minor improve...

 2020-05-27 04:01 

IT World

Use of cloud collaboration tools surges and so do attacks...

The COVID-19 pandemic has pushed companies to adapt to new government-mandated restrictions on workforce movement around the world. The immediate response has been rapid adoption and integration of cloud services, particularly cloud-based collaboration to...

 2020-05-19 14:57 

IT World

Most cloud resources drift from secure configuration baseline after deployment...

Many organizations are automating their cloud infrastructure deployments through code. This allows them to establish a secure configuration baseline early in their DevOps lifecycle, but the security posture of most cloud resources later drifts due to undo...

 2020-05-18 14:40 

IT World

Vishing explained: How voice phishing attacks scam victims...

What is vishing? Vishing is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone. While that makes it sound like an old-fashioned scam, vishing attacks have high-tech elements: they involve automated...

 2020-05-15 10:00 

IT World

8 ways attackers are exploiting the COVID-19 crisis...

While organizations can take plenty of steps to ensure employees are well-equipped to work remotely in a secure manner, threat actors of all stripes are already taking advantage of the COVID19/coronavirus situation. Never ones to miss an opportunity, atta...

 2020-05-14 19:21 

IT World

Cisco and Palo Alto Networks appliances impacted by Kerberos authentication bypass...

Cisco Systems and Palo Alto Networks have fixed similar high-risk authentication bypass vulnerabilities in their network security devices that were caused by an oversight in the implementation of the Kerberos protocol. Man-in-the-middle (MitM) attackers c...

 2020-05-08 18:42 

IT World

Attacks against internet-exposed RDP servers surging during COVID-19 pandemic...

The rush to enable employees to work from home in response to the COVID-19 pandemic resulted in more than 1.5 million new Remote Desktop Protocol (RDP) servers being exposed to the internet. The number of attacks targeting open RDP ports in the US more th...

 2020-05-08 12:24 

IT World

Zoom to add end-to-end encryption with Keybase acquisition...

Zoom has acquired secure messaging and identity management firm Keybase as its looks to shore up security capabilities on its platform with end-to-end encryption. The acquisition will give Zoom access to Keybase's encryption technology, used to secure...

 2020-05-07 13:00 

IT World

Attempted cyberattack highlights vulnerability of global water infrastructure...

In late April, Israel's National Cyber Directorate received reports about an attempted "major" cyberattack on its water infrastructure. According to a statement issued by the directorate, the attack consisted of "assault attempts on contro...

 2020-05-06 10:00 

IT World

4 tips for protecting users from COVID-19-targeted attacks...

Attackers are using this time of crisis to go after victims with targeted campaigns. The biggest threats are phishing attacks related to COVID-19. Attackers are also setting up COVID-19-related domain names and enticing people to click on them. [ Find out...

 2020-05-04 19:17 

IT World

Cloud servers hacked via critical SaltStack vulnerabilities...

Attackers are exploiting two critical vulnerabilities disclosed late last week in the popular SaltStack infrastructure automation software to take control of servers. Several organizations and open-source projects already had their servers hacked and had ...

 2020-05-04 13:00 

IT World

COVID-19 attack campaigns target hardest hit regions, research shows...

Attackers continue to exploit people's fears about the COVID-19 pandemic to increase the success rate of their malicious campaigns, including in the enterprise space. New research from security companies shows that cybercriminals are focusing their at...

 2020-05-01 03:36 

IT World

Why didn't COVID-19 break the internet?...

Just a few months into its fifty-first year, the internet has proven its flexibility and survivability. In the face of a rapid world-wide traffic explosion from private, public and government entities requiring employees to work from home to help curb the...

 2020-04-23 10:00 

IT World

Vivaldi joins anti-tracking browser brotherhood...

Niche browser maker Vivaldi Technologies this week released version 3.0 of its eponymous application, which included integrated ad- and tracker-blockers. Both tools were disabled by default in the new version, which was released Wednesday. "We believe...

 2020-04-23 10:00 

IT World

Pharming explained: How attackers use fake websites to steal data...

Pharming definition A pharming attack tries to redirect a website's traffic to a fake website controlled by the attacker, usually for the purpose of collecting sensitive information from victims or installing malware on their machines. Attackers tend ...

 2020-04-23 10:00 

IT World

Legions of cybersecurity volunteers rally to protect hospitals during COVID-19 crisis...

Last month, some of the usual cast of online scammers and malware miscreants promised to refrain from attacking healthcare organizations or exploiting them during the COVID-19 crisis, showing a sense of honor unexpected from ransomware attackers and crypt...

 2020-04-22 15:27 

IT World

Zoom unveils a host of new privacy, security features...

Looking to bounce back from a spate of recent security miss-steps, video conferencing platform Zoom today announced a variety of new privacy and security capabilities in Zoom 5.0, a key milestone in the company's recently launched 90-day security plan...

 2020-04-16 13:00 

IT World

RubyGems typosquatting attack hits Ruby developers with trojanized packages...

Over 700 malicious packages with names similar to legitimate ones have been uploaded to RubyGems, a popular repository of third-party components for the Ruby programming language. The upload took place over the course of a week in February, researchers re...

 2020-04-15 10:00 

IT World

Threat modeling explained: A process for anticipating cyber attacks...

Threat modeling definition Threat modeling is a structured process through which IT pros can identify potential security threats and vulnerabilities, quantify the seriousness of each, and prioritize techniques to mitigate attack and protect IT resources. ...

 2020-04-15 10:00 

IT World

Trump administration moves to revoke China Telecom's US license on security grounds...

Highlighting the diminished opportunities for Chinese telecom and technology providers in the US, the Department of Justice (DOJ) announced last week that the Trump Administration would seek to revoke and terminate the licenses of mobile operator China Te...

 2020-04-14 10:00 

IT World

The coronavirus is revealing our technology blunders...

You've lost your job and now you face an obsolete, sluggish unemployment system that feels like it was written in the 1950s. Actually, it's more than a feeling. If you're in New Jersey, New York or Connecticut, your unemployment system was wri...

 2020-04-09 17:13 

IT World

Google, Microsoft talk up security after Zoom firestorm...

As video conferencing platform Zoom continues to weather unfavorable headlines about its security , two big market rivals are doubling down on commitments to keeps users safe. In recent weeks, Zoom has faced a barrage of criticism involving privacy and se...

 2020-04-09 13:45 

IT World

Zoom hit by investor lawsuit as security, privacy concerns mount...

The challenges facing Zoom continue to mount, as the company now faces an investor lawsuit and more organizations ban the use of the video meeting app due to privacy and security concerns. The company also upped efforts to improve its security and privacy...

 2020-04-09 10:00 

IT World

Beware malware-laden emails offering COVID-19 information, US Secret Service warns...

As the coronavirus crisis continues to capture everyone's attention, cybercriminals stay busy running scams and delivering malware using the attention-getting virus as a lure. The threats from the scammers and crooks, which began as early as January a...

 2020-04-06 10:00 

IT World

White House strategy paper to secure 5G envisions America leading global 5G development...

With curiously little fanfare, the White House released last week a six-page document called the National Strategy to Secure 5G , a blueprint that was mandated by the Secure 5G and Beyond Act. That bill, signed into law by President Trump on the same day,...

 2020-04-03 18:27 

IT World

Zoom pauses new feature development to focus on privacy, security...

Zoom has decided to cease development of new product features so it can focus on fixing various privacy and security issues. The company has seen a surge in the use of its platform in recent weeks, as self isolation in response to the Covid-19 pandemic ra...

 2020-04-03 10:00 

IT World

New coronavirus-era surveillance and biometric systems pose logistical, privacy problems...

As the COVID-19 pandemic grips the globe, new surveillance methods are already raising new privacy and security challenges despite the still-early days of this crisis. Chief among these potential problems is the sudden turn by the government toward using ...

 2020-04-01 13:00 

IT World

Attack campaign hits thousands of MS-SQL servers for two years...

In December, security researchers noticed an uptick in brute-force attacks against publicly exposed Microsoft SQL servers. It turns out the attacks go as far back as May 2018 and infect on average a couple thousand database servers every day with remote a...

 2020-04-01 04:00 

IT World

The ins and outs of high-performance computing as a service...

Electronics on missiles and military helicopters need to survive extreme conditions. Before any of that physical hardware can be deployed, defense contractor McCormick Stevenson Corp. simulates the real-world conditions it will endure, relying on finite e...

 2020-03-30 10:00 

IT World

Dealing with the downturn...

Last week, two numbers dominated the news: 100,000, the total number of COVID-19 cases in the U.S. more than any other nation and 3.28 million, the number of U.S. unemployment claims in a single week, nearly five times that of any week since 1967. When th...

 2020-03-27 11:38 

IT World

Cybercriminal group mails malicious USB dongles to targeted companies...

Security researchers have come across an attack where an USB dongle designed to surreptitiously behave like a keyboard was mailed to a company under the guise of a Best Buy gift card. This technique has been used by security professionals during physical ...

 2020-03-25 17:42 

IT World

O'Reilly pulls the plug on in-person events...

In the wake of the COVID-19 virus pandemic, prominent technology conference producer O'Reilly has shut down its events business, permanently. From now on, O'Reilly events will be held online. The producer of events such as OSCON (O'Reilly Open...

 2020-03-24 20:38 

IT World

COVID-19 stress tests cloud services...

With the COVID-19 virus putting millions of more people into the "working from home" category, cloud service providers are being put to the test. In response, global cloud leaders are stress-testing their infrastructure and activating pandemic-spe...

 2020-03-24 10:00 

IT World

4 steps to build redundancy into your security team...

Avoid central points of failure or compromise. This fundamental tenet of information security applies not only to systems and networks, but to individuals during a time of pandemic. Key cybersecurity staff, more often than not, possess singular knowledge ...

 2020-03-23 19:56 

IT World

Tech giants, government agencies pledge supercomputing to fight COVID-19...

High-powered computer-industry players, government entities and universities are teaming up to further technology that can be used in the fight against the spread of the COVID-19 virus. The COVID-19 High Performance Computing Consortium includes IBM, AWS,...

 2020-03-23 10:00 

IT World

New York's SHIELD Act could change companies' security practices nationwide...

The Stop Hacks and Improve Electronic Data Security Act, otherwise known as the SHIELD Act , is a New York State bill signed into law last July. One key provision in the legislation that could significantly change security practices across the country is ...

 2020-03-19 12:45 

IT World

6 ways attackers are exploiting the COVID-19 crisis...

While organizations can take plenty of steps to ensure employees are well-equipped to work remotely in a secure manner, threat actors of all stripes are already taking advantage of the COVID19/coronavirus situation. Never ones to miss an opportunity, atta...

 2020-03-13 18:48 

IT World

What's in the latest Firefox upgrade? Firefox 74 ends add-on sideloading...

Mozilla on Tuesday shipped Firefox 74. Wait, didn't we just get a new Firefox a minute or two ago? It may feel that way. Firefox 74 arrived just four weeks after its predecessor, continuing the faster release cadence promised last year. The refreshed ...

 2020-03-11 12:54 

IT World

Deloitte: 8 things municipal governments can do about ransomware...

The IT systems of the City of Durham and Durham County in North Carolina have been shuttered since a successful ransomware attack struck the municipalities on the evening of March 6. Although details are still sketchy, the North Carolina Bureau of Investi...

 2020-03-10 22:55 

IT World

New CPU attack technique can leak secrets from Intel SGX enclaves...

Researchers have devised a new attack against Intel CPUs that can leak sensitive secrets stored in SGX secure enclaves and, at least in theory, from privileged processes across security boundaries such as kernel space, virtual machines and hypervisors. Du...

 2020-03-05 11:00 

IT World

How agile teams can support incident management...

No one enjoys being woken up in the middle of the night or having a weekend interrupted because of a major incident disrupting application reliability or performance. When an application is truly down and impacts business operations, few desire the pressu...

Page 1 of 2

  • Need an account?  
    or