Tim Greene

Tim Greene covers security and keeps an eye on Microsoft for Network World.

Apple patches iOS against potent zero-day spyware attack

Startup IDVector anonymizes like Tor

Startup IDVector anonymizes like Tor

A pair of former defense cyber security contractors is launching IDVector, a service that creates encrypted connections through an anonymizing network to shield users’ identities and locations and to protect their machines from...

Imperva: Application layer DDoS attacks are on the rise.

Imperva: Application layer DDoS attacks are on the rise.

Application layer DDoS attacks are becoming more common, perhaps because they cost less for malicious actors to execute and can more effectively evade defenses than network layer attacks, Imperva says.

NSA zero days and encryption backdoors need clear disclosure policies

NSA zero days and encryption backdoors need clear disclosure policies

Disclosure of NSA zero days signals a need for clear policies on when to notify affected vendors.

Cisco, Fortinet issue patches against NSA malware

Cisco, Fortinet issue patches against NSA malware

Customers of Cisco and Fortinet security gear need to check that their versions of specific devices are patched against exploits patch exploits made public this week as a result of a purported hack of NSA malware.

14 essential Windows 10 keyboard shortcuts

14 essential Windows 10 keyboard shortcuts

There are plenty of ways to navigate Windows 10, but sometimes using keyboard shortcuts is the most convenient and can save time and effort.

Snowden: Auction of stolen NSA malware likely political

Snowden: Auction of stolen NSA malware likely political

A public auction of stolen NSA malware may be a warning to the U.S. that blaming Russia for the hack of the Democratic National Committee could have dire consequences, says Edward Snowden, who also famously breached NSA security.

RiskSense lands $7M for assessment service

RiskSense lands $7M for assessment service

RiskSense, software-as-a-service that evaluates the security of corporate networks and generates a risk score, has been self-financed since its launch last year, but now has harnessed venture funding to help boost its R&D and hire...

The tide may be turning against encryption in Europe

The tide may be turning against encryption in Europe

In the wake of increased terror incidents Europe is starting to look seriously at ways to read encrypted messages that officials there say are instrumental to carrying out attacks.

Four free tools for handling Amazon Web Services security incident response

Four free tools for handling Amazon Web Services security incident response

Using AWS’s API software developer’s kit or its command line interface, customers can write their own tools for imaging disk instances that have been compromised, say Andrew Krug and Alex McCormack. The pair if researchers presented...

FTC seeks research help from DEF CON hackers

FTC seeks research help from DEF CON hackers

The Federal Trade Commission made an appeal at DEF CON in Las Vegas this past week in hopes of getting hackers to help them crack down on manufacturers and service providers that leave customers vulnerable.

Why the ‘cyber kill chain’ needs an upgrade

Why the ‘cyber kill chain’ needs an upgrade

One of the most popular models for analyzing cyberattacks doesn’t focus enough on what to do after adversaries break into networks successfully, which they inevitable will do, Black Hat 2016 attendees were told this week in Las...

Load More