How bad can cyberattacks get? How about burning the internal components of a machine, whether PC or Mac, to a crisp so there's no thought of it being recoverable? That's what security vendor CrowdStrike showed could be done to an Apple Mac OS X today at the RSA Conference.
Ellen Messmer |
26 Feb |
Read more
Two recently-discovered flaws in Apple iOS and Mac OS X have security experts openly asking whether the software vulnerabilities represent backdoors inserted for purposes of cyber-espionage. There's no clear answer so far, but it just shows that anxiety about state-sponsored surveillance is running high.
Ellen Messmer |
26 Feb |
Read more
After acquiring mobile application management company Bitzer Mobile late last year, Oracle today announced that it has taken Bitzer's basic "container" technology for Apple ioS and Google Android and linked it to identity management.
Ellen Messmer |
26 Feb |
Read more
Did the National Security Agency trick RSA, the security division of EMC, into including a crypto algorithm that was really an NSA cyber-espionage backdoor into the RSA BSAFE toolkit in order to propagate it through tech industry products?
Ellen Messmer |
25 Feb |
Read more
Check Point Software Technologies today said it is extending its security architecture to be able to incorporate more threat-intelligence data that could be shared with other vendor partners, with the goal of providing more adaptive prevention.
Ellen Messmer |
25 Feb |
Read more
Our roundup of new security products on hand at this week's show.
Ellen Messmer |
25 Feb |
Read more
AT&T and IBM, at the RSA Conference, announced they've sealed a partnership to provide security services for a wide range of enterprises in a way that blends technology and professional services both vendors have.
Ellen Messmer |
25 Feb |
Read more
Having acquired the security firm Sourcefire last October, Cisco is using this week's RSA Conference as the showcase for how Cisco's security products are being integrated as well as detailing how it will cut an open-source path for the next-generation application-layer firewall/IPS.
Ellen Messmer |
25 Feb |
Read more
It's almost a shame that former National Security Agency contractor Edward Snowden won't be at the upcoming RSA Conference since the disclosures he's leaked about the NSA's mass surveillance practices involving the U.S. high-tech industry are directly influencing a preponderance of conference agenda this year.
Ellen Messmer |
20 Feb |
Read more
Security start-ups continue to blast out of stealth mode, and among the ones seen this week, the focus is on mobile security as well as cloud-based monitoring and threat detection of software-as-a-service applications such as Salesforce and Box.
Ellen Messmer |
19 Feb |
Read more
It's not just revenues and size, influence counts and excellence matters.
Ellen Messmer |
19 Feb |
Read more
The Zeus Trojan, malware long known to steal banking credentials to siphon off victims' funds, has been spotted being put to yet another devious use: swiping business data from Salesforce.com.
Ellen Messmer |
19 Feb |
Read more
McAfee says it's developing a product it calls "Threat Intelligence Exchange," which it expects to introduce by mid-year as a core means to garner information about cyber-attacks and response for the enterprise.
Ellen Messmer |
18 Feb |
Read more
To ward off cyber-crooks trying to break into customers' accounts, banks are expanding their security efforts beyond desktops and onto iPhones and other mobile devices.
Ellen Messmer |
13 Feb |
Read more
What ever happened to the "FIDO Alliance," that industry group that first showed up a year ago saying it was going to revolutionize e-commerce online authentication by promoting a new multi-factor authentication protocol? Turns out the revolution in security is slow in coming but they're making some progress.
Ellen Messmer |
13 Feb |
Read more