|
White Paper: CA Technologies Learn more about the benefits of delivering a flawless customer experience and the risk of poor performance. Read More ▶ |
A group of what appears to be Chinese hackers infiltrated a U.S. trade-focused lobbying group as the two countries wrestle with how they treat imports of each other's goods and services. Read More ▶ |
|
Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers. Read More ▶ |
|
At least 30 percent of malware today is new, zero-day malware that is missed by traditional antivirus defenses, according to a new report Read More ▶ |
|
|
Open Web Application Security Project (OWASP) has released a set of best practices for the secure deployment of those devices. Read More ▶ |
|
Security researchers have uncovered the Android version of an iOS spyware known as Pegasus in a case that shows how targeted electronic surveillance can be. Read More ▶ |
|
The notorious hackers behind a string of banking heists have left behind a clue that reveals a long-suspected link to North Korea, according to security researchers. Read More ▶ |
|
In the matter of the Dyn situation, it was those Internet of Things devices that created the voluminous distributed denial of sevice attack. A DVR was used to attack Dyn’s network. To reduce the impact of such attacks, officials at InsuranceQuotes have noted some of the more popular smart home gadgets in your home that could be vulnerable. Read More ▶ |
|
Attackers are exploiting a vulnerability patched last month in the Apache Struts web development framework to install ransomware on servers. Read More ▶ |
|
Why web browsers leave security engineers constantly playing defense. Read More ▶ |
|
Microsoft launched Windows 3.1 on April 6, 1992. What made it so innovative 25 years ago? Let's take a stroll down memory lane in this slideshow. Read More ▶ |
|
Famed antivirus vendor McAfee is an independent company again as the sale of the majority of the firm to private equity firm TPG became final this morning. All current McAfee personnel, including research analysts, sales teams and support staff will remain in place, and products and pricing will also stay the same. Read More ▶ |
|
Endpoint security vendor F-Secure has acquired a behavior-based security application for macOS called Little Flocker that was developed by an independent researcher. Read More ▶ |
|
The U.S. might add other airports to its ban restricting passengers from bringing laptops on board certain flights from the Middle East. Read More ▶ |
|
A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a guest operating system running inside a virtual machine and access the host system's entire memory. Read More ▶ |
|
White Paper: CA Technologies This whitepaper examines the Application Economy and the challenges it presents to monitoring application performance. It also introduces CA Technologies' E.P.I.C. strategy to make APM Easy, Proactive, Intelligent and Collaborative. Read More ▶ |