Hacking The Laptop Docking Station
Black Hat Europe researcher builds prototype device that could be used to steal corporate data, listen in on voice calls, videoconferences
Did Chinese Hackers Hit NY Times?
Some evidence suggests Chinese involvement in recent attack on The New York Times. Meanwhile, Symantec goes into damage-control mode over failure to block hackers.
DARPA: Your Tech Will Self-Destruct
Defense Advanced Research Projects Agency seeks a new class of electronic devices that can dissolve on command as a way of staying out of enemy hands.
Are Your Databases Audit-Ready?
Development of policies, configuration management, encryption implementations, access control and monitoring all contribute to databases passing compliance checks
Unplug Universal Plug And Play: Security Warning
Tens of millions of devices with UPnP are remotely exploitable, warns Metasploit creator. New tool detects vulnerable devices, which include 6,900 different product versions spanning 1,500 vendors.
iOS 6.1 Fixes 27 Vulnerabilities
20 remote code execution errors in the WebKit browser engine, a staple of Apple security updates, are fixed in the new release for iPhones, iPads, and iPod Touches. Some of the bugs fixed are quite old, with one reported in 2011
6 Steps To Better Customer Data Protection
Privacy isn't a concern just for the Googles and Facebooks of the world. Here are six ways small and midsize businesses (SMB) can better protect their customers -- and themselves.
Security No-Man's Land
As the industry descends on the RSA Conference to discuss the latest and greatest in security, the underserved midmarket continues to struggle with basic blocking and tackling. The industry machinery is not built to solve that problem
Avoiding IAM's Biggest Blunder
Leaving orphan accounts enabled due to poor deprovisioning processes leaves organizations open to fraud and makes it impossible to prove chain of custody
SCADA Security 2.0
Siemens will consider whether to offer a bug bounty program as security experts look at new approaches to tackling SCADA security woes
China Accused Of Java, IE Zero Day Attacks
Human rights groups have been victims of "watering hole" attacks using recently discovered -- and patched -- flaws in Java and Internet Explorer, security researcher says.
RIM Launches BlackBerry Enterprise Service 10
RIM's new mobility management platform will help companies manage BlackBerry 10 devices, as well as those powered by iOS and Android, in an effort to regain relevance in the BYOD market.