Blog Profile / ZDnet: Security

Filed Under:Technology / Security
Posts on Regator:1626
Posts / Week:29.1
Archived Since:August 24, 2016

Blog Post Archive

The political challenges of implementing smart city solutions

Andy Berke, mayor of Chattanooga, Tennessee, talks about balancing the political demand for short-term results with long-term goals.

Low-cost tools making cybercrime more accessible: SecureWorks

A report from the security vendor has said the increasing affordability of cybercrime tools is providing budding criminals with a low barrier of entry into the game.

New alliance advocates the blockchain to improve IoT security, trust

The Trusted IoT Alliance hopes to "set the standard" for IoT blockchain protocols worldwide.

Double trouble: This ransomware campaign could infect your PC with two types of file-locking malware

Victims around the world hit by criminals who can switch the malicious payload of emails between Locky and FakeGlobal on a whim.

Enterprise IT security planning: Five ways to build a better strategy

Struggling to get the boss to take security seriously? Here are some pointers that can help the board get on-board.

Phishing: These are the days of the week when you're most at risk

Security threats vary by the day of the week, with more malicious software detected on Mondays.

EFF resigns from W3C in wake of EME DRM standardisation

Failure to protect researchers and abandonment of consensus has seen the digital rights organisation walk away from the W3C consortium.

How to use Let's Encrypt to secure your websites

Let's Encrypt is easy to use and free -- no wonder it's the most popular Certificate Authority for securing websites. Here's how you can use it.

As wearables have evolved to standalone IoT devices, security demands have changed too

Samsung's Eric McCarty on how the evolution of wearables has changed the security imperative.

The security factors behind AT&T's decision to deploy LTE-M

Chris Penrose, the president of IoT solutions at AT&T, explains how IoT network standards can influence security.

How IOT network standards can influence security

Chris Penrose, president of IOT solutions at AT&T, explains the security factors that influenced AT&T's decision to deploy LTE-M networks.

Azure confidential computing: ?Microsoft boosts security for cloud data

Microsoft is rolling out new secure enclave technology for protecting data in use.

Why free VPNs are not a risk worth taking

Here's a question. If you're not paying for your VPN service, where is the provider getting the money to run it? The answer might cause you to lose some sleep.

Hackers hid malware in CCleaner PC tool for nearly a month

Popular utility from a company owned by Avast was compromised to spread malware to potentially millions of PCs.

BT launches Sydney cybersecurity centre

The BT cybersecurity R&D centre will provide more than 170 jobs across cybersecurity, machine learning, data analytics, big data engineering, cloud computing, and software engineering, the NSW government said.

APNIC-sponsored proposal could vastly improve DNS resilience against DDoS

Denial of service attacks can be reduced by replying to DNS requests with a huge range of nothing, and remembering it.

Equifax CIO, CSO step down

One week after revealing a massive data breach, Equifax announced two of its executives are "retiring," effective immediately.

?Check Point's bogus Windows Subsystem for Linux attack

If you deliberately set out to make your Windows system open to attack via WSL, yes, you could be attacked by Bashware.

How the evolution of wearables has changed security requirements

As wearables have evolved to standalone IOT devices, and as different enterprise use cases have emerged, security demands have changed, explains Samsung's Eric McCarty.

Copyright © 2015 Regator, LLC