Microsoft on Monday reported that multiple malicious actors were taking advantage of vulnerabilities in its Exchange software last week to attack systems at organizations that have failed to patch the flaws. The company attributed the attacks "with high confidence" to Hafnium, a group believed to be state-sponsored and operating out of China...
Two things are happening simultaneously: The RSA Security Conference is in full swing and so is COVID-19. It's a strange juxtaposition. The conference is going on undeterred just a few blocks from where the mayor declared a state of emergency due to the ongoing spread of the virus. There's also topi...
Less than two months after publicly announcing that he was pulling out of the RSA Security Conference because RSA had accepted a $10 million contract from the NSA, F-Secure chief researcher Mikko Hypponen appeared somewhat mellowed. He alternated between criticizing RSA and offering an olive branch ...
The United States Department of Justice and the Federal Bureau of Investigation have hammered the Coreflood botnet, which its owners used to conduct cyberfraud on a massive scale. They have seized five command and control servers and 29 domain names registered in the United States, obtained a tempor...
When the former vice president of the United States gives a speech at a major technology conference in San Francisco, you'd expect to see a story about it the next day, or -- since it was a technology conference -- later on that same day. You'd see a run-of-the-mill story in the Chronicle or the Exa...
Unwilling to believe that resistance to a Microsoft takeover is futile, Yahoo is throwing a lot of strategies at the wall to see what sticks. Its latest effort is a trial advertising partnership with Google -- a two-week test of its AdSense service. Yahoo plans to run Google ads alongside up to 3 pe...
The face of online security will change drastically, Jim Bidzos, founder and chairman of trusted certificates vendor VeriSign, said in a keynote speech on Wednesday at the RSA Security Conference in San Francisco. "In the '70s in enterprises, there were mainly mainframes. The Internet, due to good w...
How do you respond when hit by a cyber attack tsunami? That's the question Cyber Storm II, the most comprehensive cyber exercise ever held in the U.S., was designed to answer. Forty private sector companies, 11 Cabinet-level agencies, 10 states and five countries were involved in the March exercise,...
After working for years to prevent cyberterrorist attacks on the U.S., the Department of Homeland Security has approached the private sector for help. At a talk given to information security professionals at the RSA Security Conference, Homeland Security Secretary Michael Chertoff warned that a cybe...
Archer Technologies on Tuesday launched the Archer Exchange, a virtual marketplace for on-demand application development wherein companies that have developed applications in-house can put them up on the exchange for sale to other corporations. The company made the announcement at the RSA Security C...
Important to me so I can accept, deny, or customize my preferences before entering a website.
Inconvenient, but a fair exchange for knowing the website operator is likely serious about privacy and compliance.
An endless, unnecessary burden with a minimal effect that I wish was gone.
Enter your Username and Password to sign in.