Security News & Reviews - Page 3

More Security News

Meltdown, Spectre Chip Flaws

Microsoft Resumes Issuing Windows Patches to Fix Meltdown, Spectre

After a rocky start, Microsoft begins re-issuing patches that include Intel firmware patches for the Meltdown and Spectre CPU flaws.

Startup Xage Launches Blockchain-Protected IIoT Security

New company distributes authentication and private data across industrial edge network of devices, creating a tamper-proof fabric for communication, authentication and trust.
Daily Tech Briefing - March 2, 2018

Hackers Using New Type of DDoS Attack to Boost Volume VIDEO

DAILY VIDEO: Attackers are using memcached servers to amplify DDoS attacks; Google introduces an SSL policy setting capability for load balancers; enterprises gain extra setup features in Windows 10 Build 17110; and there's more.
Fortinet Michael Xie

Fortinet Boosts Security Fabric With Cloud, SD-WAN Security Features

The network security vendor releases its FortiOS 6.0 firmware, providing expanded visibility and control to enable a multidevice security fabric.
New Gen Authentication Methods

Five New Ways to Prove It’s Really You Logging into Personal Accounts

Since the Equifax breach revealed that the personal information of more than half the adult population of the U.S. had been compromised, security firms have developed new ways to sign into services more securely.
GitHub DDoS

GitHub Hit By Largest DDoS Attack Ever Recorded at 1.35 Tbps

GitHub was a victim of a Distributed Denial of Service attack that uses mis-configured memcached servers to amplify attack traffic. The good news though is that the attack was mitigated inside of 8 minutes.

Bugcrowd Raises $26M to Expand Bug Bounty Platform

The managed bug bounty platform vendor looks to grow its business beyond vulnerability disclosures to help organizations meet security compliance objectives.
Microsoft Biometric Security

Nuance Biometric Security Turns Your Body Into an Authentication Tool

NEWS ANALYSIS: Nuance uses new developments in biometrics to identify a person through unique characteristics that are nearly impossible to crack.
Confusing Meltdown, Spectre Patch Array

Top Five Ways Security Vulnerabilities Hide in Your IT Systems

Corporate IT systems with known vulnerabilities are often missed or overlooked. In the case of Equifax, a known vulnerability led to hundreds of millions of dollars in losses. Here are the top-5 ways that vulnerabilities hide inside your company.
Cloud Security Concern

Google Introduces SSL Policy Setting Capability For Load Balancers

Organizations using Google' cloud now have greater control over how its HTTPS and SSL Proxy load balancers connect with client systems.
February eWEEK Recap Video

Social Networks Purge Bots Spreading Fake Posts on Florida Killings VIDEO

Russian operatives used phony social media accounts, bots and automated postings to spread disinformation about the mass shooting at a Florida high school killing 17 students and staff.
DDoS Amplification 2

Attackers Using Memcached Servers to Amplify DDoS Attacks

Multiple vendors are warning about the rise of a new type of DDoS attack that uses internet accessible memcached services to amplify the volume of attack traffic.

Enterprise Tech Videos