Security News & Reviews - Page 5
More Security News
A new ransomware attack with similar characteristics to the NotPetya and WannaCry attacks has hit public infrastructure in the Ukraine and impacted other countries across Europe.
The Cloud Native Computing Foundation adds a pair of open-source security efforts to its project roster, providing cryptographically verifiable software integrity.
DAILY VIDEO: Google's industry rivals report security issues on Play Store, Chrome; Cisco Systems acquires new-gen application monitor Perspica; Improved security most important new feature in Windows 10 update; and there's more.
A Veracode study finds that developers make the same software security mistakes year after year. eWEEK looks at the latest Veracode State of Software Security report.
US-CERT releases a technical alert based on information from the DHS and FBI about ongoing cyber-attacks that are taking aim at critical industrial infrastructure across the U.S.
A refreshed version of the CSA’s 2016 report includes new real-world anecdotes and examples of recent incidents that relate to each of the 12 cloud-computing threat categories.
Phishing continues to be a lucrative form of attack, and attackers are finding some departments to be more attractive than others. Here is a look at which employees phishers will most likely target and why.
An eWEEK-moderated panel of container security vendors at the DockerCon EU conference discussed what users need to know and how the vendors differentiate themselves from each other.
Google has removed eight malware-infected applications from the Play Store and addressed a remote code execution flaw in Chrome.
Two U.S. representatives introduce legislation that aims to give companies the legal protection needed to pursue and identify hackers over the Internet.
Tanium CEO Orion Hindawi wants his customers to be concerned about the things they actually can control that will help to improve security.
Groups linked to China continue to launch attacks at the nation’s rivals, with reports of one group targeting Japanese companies using a zero-day vulnerability and a second group exploiting its victims with a decade-old RAT.