Skip to main content

ZDNet Vulnerability Resources

Syndicate content Latest topics for ZDNet in Security
Latest topics for ZDNet in Security
Updated: 9 hours 22 min ago

Zero Day Weekly: Plex ransomed, FBI on California cable-cutting, MasterCard's selfie passwords, BitStamp breach

Fri, 07/03/2015 - 16:41
A collection of notable security news items for the week ending July 3, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.








Plex forum data held hostage: change your password now

Fri, 07/03/2015 - 04:55
A hacker is demanding payment -- or Plex will find its data spread across the Internet.








How to access Wi-Fi anonymously from miles away

Thu, 07/02/2015 - 07:14
A tiny device provides an extra layer of defense which can keep the online activities of journalists, activists and criminals hidden.








College student tops Brazilian banking malware creator list

Thu, 07/02/2015 - 04:14
The 20-year-old is believed to have developed over 100 banking Trojans in only the past few years.








Level 3 acquires DDoS mitigation firm Black Lotus

Thu, 07/02/2015 - 03:13
The deal adds proxy-based DDoS mitigation services to Level 3's portfolio.








Singapore adds 2FA security to e-government services

Thu, 07/02/2015 - 01:05
SingPass users will need to set up the two-factor authentication process in their account, linking either their mobile number or the country's national 2FA token, OneKey.








MasterCard to trial using selfies as authentication

Wed, 07/01/2015 - 21:48
Looking at your phone may become the new way to pay, as MasterCard begins experimenting with biometric technology to allow users to pay with a touch of a finger or a by taking a selfie upon checkout.








Okta upgrades mobile gateway with more security, Apple Watch support

Wed, 07/01/2015 - 09:00
Okta is giving IT managers more control on its mobile management platform with VPN and Wi-Fi profile provisioning.








Want to know if your employees are security savvy? Run your own phishing campaign

Wed, 07/01/2015 - 05:00
In a Q&A with ZDNet, the vice president of Cybersecurity Services at Fidelis explains why top-level management has to be the security-focused example for others to follow.








Team GhostShell: Back with a bang and after your data

Wed, 07/01/2015 - 04:54
The group has re-emerged from the shadows with a reported stream of hacks and data thefts in the past 24 hours.








Europol ramps up efforts to combat online terrorist propaganda

Wed, 07/01/2015 - 03:59
The agency says a new task force will focus exclusively on fighting terrorist and violent extremist propaganda online.








Apple patches dozens of security flaws in iOS 8.4, OS X 10.10.4

Wed, 07/01/2015 - 03:58
The updates fix vulnerabilities including flaws which allow both remote code execution and man-in-the-middle attacks to occur.








Great user experience leads to great security

Tue, 06/30/2015 - 19:30
Security need not be a series of walls. A UX expert says security can be gently woven into the flow of applications.








NSA can resume bulk collection of Americans' phone records, says court

Tue, 06/30/2015 - 12:07
The secretive Washington, DC-based court determined that the Freedom Act, passed earlier this month, would allow the data collection to begin once more.








​Amazon introduces new open-source TLS implementation 's2n'

Tue, 06/30/2015 - 10:08
s2n, with its mere 6,000 lines of code, focuses only on encryption.








'Personal' Dark Web service removes corporate cyberthreat blindness

Tue, 06/30/2015 - 07:00
The new service dives into the murky Dark Web to track your stolen data, hacktivism, insider threats and hackers willing to break into your network.








Cisco to buy cybersecurity firm OpenDNS in $635m deal

Tue, 06/30/2015 - 06:33
The deal will give Cisco better visibility into the security and threat landscape.








An explosion in apps development means security headaches for CIOs

Tue, 06/30/2015 - 06:17
App development teams need to test against copies of the production database — each copy increases the risk of a major security breach.








MIT develops donor 'transplants' for buggy code without access to the source

Tue, 06/30/2015 - 06:14
'Donor' programs provide the band-aid to fix buggy code and eliminate errors.








Amazon patches three vulnerabilities in Fire smartphones

Tue, 06/30/2015 - 04:10
Two of the vulnerabilities place secure communication at risk and could allow for man-in-the-middle attacks.