‘No viruses! Honest!’

These “free USB sticks” were left for the taking in our break room here at Network World headquarters. And, even though I’m reasonably certain I know who left them, there’s no way I’m falling for the old “No viruses! Honest!” trick. To read this article in full or to leave a comment, please click here […]


IDG Contributor Network: What is the future of mobile communications app security

We are well on our way to a world where communications traffic between mobile apps will be completely secure. Whether voice or text, monitored traffic will be encrypted and uncrackable, even with the cooperation of the app or device developers. A recent example, Facebook’s WhatsApp is reportedy causing law enforcement concern, as it appears to[…]

Hackers can abuse the iOS mobile device management protocol to deliver malware

Starting with iOS 9, Apple has tried to make it harder for attackers to trick users into installing unauthorized apps on their devices by abusing stolen enterprise certificates. However, it left one door open that attackers can still exploit: the protocol used by mobile device management products. In a presentation at the Black Hat Asia[…]

5 dev tools for better code security

5 dev tools for securing your code Image by geralt via pixabay Information security is of paramount importance these days, and there is no better place to start securing systems and data than in the software development process itself. To read this article in full or to leave a comment, please click here Source:[…]

MedStar Health partially restores services after suspected ransomware attack

MedStar Health said Wednesday it is restoring computer systems following a cyberattack that reportedly involved file-encrypting malware. The not-for-profit organization, which runs 10 hospitals in the Washington, D.C., area, was hit with ransomware, the Baltimore Sun reported on Wednesday, citing two anonymous sources. MedStar Health officials could not be immediately reached for comment. The organization[…]

Rules, smules, classified, smashified: Those things don’t seem to apply to Clinton

Rules, smules…they don’t seem to apply to Hillary Clinton. The Washington Post has an excellent piece about the Clinton email scandal. For “personal comfort” reasons, she wanted to use her personal unencrypted BlackBerry for all her email, despite warnings that it could be vulnerable. She even took it overseas, although she supposedly said she “gets[…]

Security Sessions: How to transition from tech professional to a business leader

Many security pros came up through the career ranks with a solid tech background. But security leadership demands more business acumen and expertise today. Lorna Koppel, Direction of Information Security for Tufts University, has been through this process in her career and shares her tips for making the transition smoothly and effectively. Source: NW Security[…]

CNBC just collected your password and shared it with marketers

CNBC inadvertently exposed peoples’ passwords after it ran an article Tuesday that ironically was intended to promote secure password practices. The story was removed from CNBC’s website shortly after it ran following a flurry of criticism from security experts. Vice’s Motherboard posted a link to the archived version. Embedded within the story was a tool in[…]

IDG Contributor Network: What terrorism investigations can teach us about investigating cyber attacks

Having a military background, I tend to look at all security issues with the perspective of someone who’s served in the armed forces. That means using a thorough investigation process that doesn’t treat any action as accidental or an attack as a stand-alone incident and looking for links between seemingly unconnected events. This method is[…]