Access Control

Access Control news, trend analysis and opinion

Cisco integration gives Samsung Knox users more options for secure connectivity

Under pressure from falling phone sales, Samsung continues to court CIOs

China tightens Internet control by blocking VPN services

Clampdown causes problems for users attempting to connect to Gmail and other sites


Thousands of U.S. gas stations exposed to Internet attacks

Over 5,000 tank gauges that are used to monitor fuel levels and potential spills are accessible from the Internet without a password

Sharp rise seen in attacks using stolen credentials

The attacks have been beating fraud detection systems

doctor medical tablet

Healthcare breaches need a cure for human errors

Digital health records are a prime target for cyber criminals. The information can be used in a variety of ways, from identity theft to fraudulently obtaining prescription drugs. It retains its value much longer than credit card...

Google publishes third Windows 0-day vulnerability in a month

Google is sticking to its 90-day disclosure deadline, despite criticism by Microsoft

cutcaster 902830953 tour small

Throw your vendor under the bus after a breach? Not quite so fast

Tips for your third-party risk management program.

Exploit allows Asus routers to be hacked from local network

Users should install firmware updates as soon as they become available and should block untrusted devices on their networks

CryptoWall ransomware variant has new defenses

Cisco found that the latest version of the malware terminates itself if it runs in a virtual machine

Apple blocks tool that brute-forces iCloud passwords

The tool allowed attackers to try a large number of passwords for Apple ID accounts

Moonpig jeopardizes data of millions of customers through insecure API

The company failed to fix a security flaw reported over a year ago, a developer said

Free tool automates phishing attacks for Wi-Fi passwords

The tool can disconnect Wi-Fi users and trick them into disclosing their access password to a rogue access point

010515 utm 1

UTM Shootout: Security appliances for SMBs are smaller, more powerful and packed with new features

Vendors are coming up with new ways to fit enterprise-grade security features into more compact and more powerful appliances.

Thunderbolt devices can infect MacBooks with persistent rootkits

The rogue code will run in the boot ROM and will be hard to detect or remove, a researcher said

Two-factor authentication oversight led to JPMorgan breach, investigators reportedly found

The attackers stole an employee's access credentials and used them to access a server that lacked a stronger authentication mechanism

new years fireworks

5 lessons to help security pros craft a New Year’s resolution

2014 taught us a lot of hard lessons about data breaches, privacy and corporate security. As SANS' Dr. Eric Cole points out, there are a number of valuable take aways that security leaders can reflect on to make 2015 a better year

122214 passwords 1

Old-school tricks to protect your passwords

If you’re caught in password purgatory, try these 6 old-school password tricks.

Trojan program based on ZeuS targets 150 banks, can hijack webcams

The new Chthonic Trojan borrows features from ZeuS and several of its spinoffs, researchers from Kaspersky Lab said

The 'grinch' isn't a Linux vulnerability, Red Hat says

The way Linux handles user permissions could still lead to potential misuse, security researchers say

Vulnerability in embedded Web server exposes millions of routers to hacking

Attackers can take control of millions of routers by sending a specially crafted request to RomPager, an embedded Web server running on them

Load More