Think North Korea hacked Sony? Think about this

North Korea or not? There's still a lot we don't know about the attack on Sony Pictures and those behind it.

By Martyn Williams | 19 December, 2014 11:47

Tags: Criminal, security, legal, data breach, Sony Pictures, cybercrime

The 'grinch' isn't a Linux vulnerability, Red Hat says

The "grinch" Linux vulnerability that Alert Logic raised alarms about Tuesday is not a vulnerability at all, according to Red Hat.

By Joab Jackson | 19 December, 2014 08:27

Tags: security, Access control and authentication, Red Hat, Exploits / vulnerabilities

Driver's license app on a smartphone raises privacy issues

A smartphone app that drivers in Iowa will be able to use as an official driver's license could lead to privacy abuses by law enforcement.

By Lucas Mearian | 19 December, 2014 07:47

Tags: Department of Transportation, security, data privacy, privacy

Worst security breaches of the year 2014: Sony tops the list

As 2014 winds down, the breach of Sony Pictures Entertainment is clearly the biggest data breach of the year and among the most devastating to any corporation ever.

By Tim Greene | 19 December, 2014 07:24

Tags: security, Year in review 2014, data breach, sony

Vulnerability in embedded Web server exposes millions of routers to hacking

A serious vulnerability in an embedded Web server used by many router models from different manufacturers allows remote attackers to take control of affected devices over the Internet.

By Lucian Constantin | 19 December, 2014 06:16

Tags: Huawei Technologies, Tp-link Technologies, Networking, ZTE, routers, Exploits / vulnerabilities, networking hardware, Check Point Software Technologies, intrusion, security, Access control and authentication, Allegro Software Development, Edimax Technology, ZyXEL Communications, D-Link

Sony hit with second employee lawsuit over hack

Sony Pictures has been hit by a second lawsuit alleging it didn't do enough to safeguard the personal information of employees that was lost in a major hack in late November.

By Martyn Williams | 19 December, 2014 03:49

Tags: Criminal, security, legal, data breach, Sony Pictures, cybercrime

Point-of-sale malware creators still in business with Spark, an Alina spinoff

A malware program dubbed Spark that steals payment card data from compromised point-of-sale (POS) systems is likely a modification of an older Trojan called Alina, and highlights a continuing, lucrative business for cybercriminals.

By Lucian Constantin | 19 December, 2014 03:29

Tags: intrusion, trustwave, security, data breach, fraud, malware

U.S. on Sony breach: North Korea did it

U.S. officials now believe North Korea is behind the attack that took down Sony Pictures Entertainment's computer network and posted contents on the Internet, but the government hasn't decided whether to formally accuse the country of carrying out the hack, according to The New York Times.

By Tim Greene | 19 December, 2014 00:41

Tags: new york times, The New York Times, security, legal, Sony Hack, sony, north korea, cybercrime

ATM skimmers strike in Queensland

A gang of ATM skimmers has been at work in Queensland with several ATMs in South East Queensland targeted recently, say state police.

By Computerworld Australia staff | 18 December, 2014 11:38

Tags: ATM skimming, queensland police service, queensland, Christmas

Sony cancels 'The Interview' release after threats following cyberattack

Sony Pictures on Wednesday canceled the Dec. 25 release of its controversial comedy, "The Interview," after theater chains decided not to play the film following terrorist threats after a cyber attack.

By Zach Miners | 18 December, 2014 10:57

Tags: Criminal, security, legal, data breach, data protection, Sony Pictures, cybercrime, privacy

Forensic software gets around iCloud security features

A Russian software company has updated its forensic software to work-around the security features Apple recently added to iCloud and increased what information can be extracted from the cloud storage service.

By Fred O'Connor | 18 December, 2014 09:03

Tags: Apple, security, Elcomsoft, software, internet, cloud computing

Obama pushes for net neutrality, opposes data localization in trade pact

President Barack Obama's administration is pushing two potentially controversial Internet policies in a secretive trade pact, with trade negotiators calling for other countries to adopt net neutrality provisions while rejecting policies requiring local storage of data in a secretive 50-country trade pact now being negotiated.

By Grant Gross | 18 December, 2014 08:24

Tags: Associated Whistleblowing Press, Lori Wallach, Public Citizen, Office of U.S. Trade Representative, regulation, U.S. National Security Agency, U.S. Federal Communications Commission, Barack Obama, government, trade, privacy, Tom Wheeler, security

Cloud provider pits 6TB hard drives in real-world face off

Cloud service provider Backblaze has published performance and reliability data on two of the industry's leading 6TB 3.5-in. hard drives from Seagate and Western Digital (WD).

By Lucas Mearian | 18 December, 2014 07:55

Tags: BackBlaze, Data storage, WD, storage, western digital

ICANN data compromised in spearphishing attack

A so-called spearphishing attack on ICANN has compromised the email credentials of several ICANN staff members and allowed the attacker access to user information, including email and postal addresses.

By Grant Gross | 18 December, 2014 04:41

Tags: ICANN, intrusion, security, data breach, internet

Comms Alliance calls govt plan a 'data creation regime'

The telecom industry has disputed the notion that the government’s proposed data retention regime will not create significant additional costs for the industry.

By Adam Bender | 17 December, 2014 16:16

Tags: national security, John Stanton, law enforcement, Communications Alliance, Parliament, data retention, telecom, government, privacy, public safety, Comms Alliance, surveillance

TorrentLocker ransomware targets 9,415 Australians: report

TorrentLocker ransomware attacks affected 9,415 users in Australia, according to a new report by security vendor ESET.

By Hamish Barwick | 17 December, 2014 15:15

Tags: State Debt Recovery Office, NSW Office of State Revenue, ransomware, eset, TorrentLocker ransomware

Data retention: It's really, really important (but we still can't give you any details)

As the Parliamentary Joint Committee on Intelligence and Security held its first hearing of an inquiry into the government's data retention bill, key details of the proposed regime are still yet to be revealed.

By Rohan Pearce | 17 December, 2014 13:48

Tags: data rentention, civil liberties, privacy

Google's work on full encryption chugs along, with Yahoo's help

Google is making progress developing a user-friendly tool for fully encrypting people's messages on their computers, with coding help from Yahoo and a transition to GitHub.

By Zach Miners | 17 December, 2014 10:07

Tags: Yahoo, Internet-based applications and services, Google, security, Mail, encryption, internet

First lawsuit filed against Sony after massive hack

Two former employees of Sony Pictures have filed a lawsuit against the company alleging it didn't do enough to safeguard their personal information and prevent its loss in a massive cyberattack in late November.

By Martyn Williams | 17 December, 2014 08:06

Tags: Criminal, legal, Sony Pictures, cybercrime

New England security group shares threat intelligence, strives to bolster region as cybersecurity mecca

The Advanced Cyber Security Center is a three year old organization with a bold mission to "bring together industry, university, and government organizations to address the most advanced cyber threats" and drive cybersecurity R&D in the New England region. Network World editor in Chief John Dix attended their most recent meeting in Boston and later tracked down ACSC Executive Director Charlie Benway and ACSC Board Chair William Guenther (CEO and Founder of Mass Insight) for a deep dive on the organization's goals.

By John Dix | 17 December, 2014 06:44

Tags: acs, csc, education, security, training, beca, industry verticals, IT management

Top Whitepapers

Twitter Feed

Featured Whitepapers