Dave DeWalt — known for his big personality, top-secret government clearance, and work as former chief executive at McAfee — is taking over as chief executive for security company FireEye today. He hopes to lead the company to an IPO quickly.
Google Webmaster Tools, the Google site that helps website owners manage how their site appears in Google, diagnose problems, and optimize traffic, is currently experiencing a major security breach.
Guest Post In a field where handwriting notes on paper charts and managing large rooms filled with filing cabinets have been the accepted practices for decades, healthcare providers are being deluged by a perfect storm.
At CloudBeat, a panel of healthcare-technology experts will gather to discuss ways to improve security for cloud-based systems.
Guest Post Here’s how to avoid being one of the 1.5 million people that fall victim to cybercrime every day.
Once upon a time, you knew who to fire when a hack took down your servers: The “little weenies” running around in the basement of your company, as AlienVault’s Russell Spitler put it. But that’s all changing.
Several NBC websites were briefly hacked today by a hacker trying to make a very original Guy Fawkes Day reference.
EMC Corporation, a multinational oldster in big data and cloud storage, has just agreed to buy Silver Tail Systems, a startup that uses real-time predictive analytics to detect and prevent online fraud and crime.
T-Mobile says it will start shipping Android phones preloaded with an app-scanning program by Lookout Mobile. The app is called Automatic App Security, and it marks a big partnership for the mobile security company.
Every two minutes, someone in the US is sexually assaulted. Shouldn’t our mobile devices help make women safer?
A special White House investigation couldn’t find any evidence of Chinese spying through Huawei telecommunications systems, though the U.S. recently warned businesses using the vendor that it “cannot be trusted to be free of foreign state influence.”
Guest Post Cable companies such as Comcast and Cox need to take a good look at their technology as streaming services Netflix and Hulu take away their profits. In order to avoid becoming obsolete, it makes sense for cable companies to recycle their infrastructure into home automation.
This is a I-screwed-up post. And it’s a clear-the-air post.
In addition, VentureBeat has discovered, Authentec has discontinued both the original security software and its replacement … and deleted the evidence from its website (though not from Google’s cache).
The U.S. Congress Intelligence Committee and telecommunications vendor Cisco are agreed on one thing: Chinese networking equipment companies can’t be trusted.
Ensafer is one approach to cloud security. It’s a product for end-to-end encryption — that means your stuff, whatever it is, stayed encrypted through transporting, sharing, storing, etc.
Secure cloud hosting company FireHost raised $10 million in its third round of financing.
A draft of a White House executive order on cybersecurity has leaked out, but it’s pretty vague.
iPhones hear the name “Charlie Miller” and run, Siri screaming her mortal fear. Now Twitter employees will hear the name “Charlie Miller” and will know their hacker coworker is securing the company’s mobile apps.
The good news is that only 1.5 percent of Android apps are malicious. The bad news is that malware is up 216 percent in just three months.
Duo Security’s app X-Ray found that over 50% of Android have unpatched vulnerabilities.
Editor’s Pick Jack Dorsey confessed something on stage here at Techonomy Detroit today: He hacked into the world’s largest dispatch company’s email system in order to get a job.
Tenable Network Security has taken $50 million in its first round of funding for its software that protects against cyber crime.
Apple may have a patent on unlocking a smartphone via gestures, but Google just won a patent for unlocking any computing device just by looking at it.
The future of the top U.S. Bitcoin echange is in doubt after $250,000 in virtual currency was stolen last night.
As CNet reports, an unidentified hacker found and absconded with an unencrypted backup of virtual wallet keys, taking 24,000 bitcoins, each worth just over ten U.S. dollars. It’s the virtual equivalent of leaving your wallet on the cafe table as you go to use the restroom.
Mobile malware has exploded this year, growing almost 700 percent over 2011 numbers. Almost all of it, perhaps 85 percent, targets smartphones running Android.
Microsoft’s new service agreement gives the company the ability to share a user’s data with all of its cloud-based services.
Guest Post Last night’s changes to Microsoft’s Services Agreement mean only bad things for users.
In a statement sent to media outlets yesterday, Apple said it takes security very seriously, but it directs users to use Apple’s own iMessage service instead of texting.
While dedicated hackers can be an annoyance to companies like Apple, they can sometimes be helpful when it comes to digging up potentially devastating security vulnerabilities.
Imagine this: you phone your bank, asking a service rep to pay a phone bill and transfer money from savings to checking. Only, instead of talking to the bank, you’re speaking to a crook who is talking to you on one phone … and your bank on the other. And when you provide him with all the authentication details your bank requires, he loots your account and transfers your funds into accounts he controls.
The latest WikiLeaks release has shone a spotlight on an alleged domestic and foreign surveillance program run with cloud-based software provided by Texas company TrapWire, many of whose top leaders and employees are former members of three-letter American intelligence agencies.
A horrifying hack of one journalist’s data was only possible thanks to an appalling lack of security in iCloud — and a correspondingly bad security process at Amazon.com.
Reuters’ blogging platform was hacked today, allegedly by Syrian hackers loyal to President Bashar al-Assad.
Online security company Bit9 just announced the close of $34.5 million funding from some of the biggest names in venture capital. This is Bit9′s fourth round, and it’s led by Sequoia Capital. The round also includes existing investors Atlas Ventures, Highland Capital Partners, Kleiner Perkins Caufield & Byers, and .406 Ventures.
Do you want legs that let you jump 10 feet high? Or a body that “impresses chicks”? Or a brain that can be electronically pulled back from extreme depression? Computer experts of today think that the day will be coming when human cyborgs will be possible?
Secure collaboration firm WatchDox just released the results of a document security study by the Ponemon Institute. And the consensus is that we suck at security.