Security News

Apple complicates app sideloading in iOS 9 for increased security (Help Net Security)
2015-09-11 13:38

Making things easier for users is generally a good idea, but sometimes complicating a process could lead to increased security, and should be the preferred option. A blog post by Lookout Product Ma...

Series of Buffer Overflows Plague Many Yokogawa ICS Products (Threatpost)
2015-09-11 13:19

There is a series of stack buffer overflows in nearly 20 ICS products manufactured by Japanese vendor Yokogawa that can lead to remote code execution. The bugs affect a long list of the company’s...

Gary McGraw on Scalable Software Security and Medical Device Security (Threatpost)
2015-09-11 13:11

Dennis Fisher talks to Gary McGraw about the challenges of scaling software security programs, the FTC’s security programs, and the current push for better security in medical devices.

Just Like Old Days: IOT Security Pits Regulators Against Market (Threatpost)
2015-09-11 12:16

A panel discussion at the Security of Things Forum debated the need for regulation to ensure the security and privacy of connected devices.

FireEye legally censors crucial parts of a researcher's talk at 44CON (Help Net Security)
2015-09-11 11:23

Felix Wilhelm, a researcher with German security firm ERNW, was scheduled to give a talk at 44CON on Thursday about the critical vulnerabilities he and his colleagues found in a FireEye NX device runn...

The cost of EMV compliance (Help Net Security)
2015-09-11 08:30

Credit card companies are making the final call for US merchants to switch over to EMV chip technology in anticipation of the looming deadline. Merchants now have less than one month to update their p...

Do conventional security measures negatively impact productivity? (Help Net Security)
2015-09-11 08:00

91 percent of business respondents reported that their productivity is negatively impacted by security measures their employer has put in place, according to Dell. However, if a business were to imple...

63% in favor of encryption backdoors to respond to national security threats (Help Net Security)
2015-09-11 07:30

Vormetric did a survey on how Americans view "backdoor" access by government entities to the encrypted data of private businesses. Ninety-one percent recognized that there were risks to encryption bac...

Vulnerability management embraces new functions (Help Net Security)
2015-09-11 07:00

Vulnerability management (VM) solution providers have always held their own in the global network security domain. VM technologies scan network endpoints such as desktops and mobile devices against a ...