The view from the top of IT with TechWorld Editor Rohan Pearce
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
By Juan Carlos Perez | 05 December, 2013 19:28
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data.
By Lucian Constantin | 05 December, 2013 15:26
In a development likely to concern those who believe that a system that's not connected to a network is safe from surveillance, researchers have demonstrated that microphones and speakers built into laptops can be used to covertly transmit and receive data through inaudible audio signals
By Lucian Constantin | 03 December, 2013 17:25
The U.S. National Security Agency reportedly hacked into over 50,000 computer networks around the world as part of its global intelligence gathering efforts, and also taps into large fiber optic cables that transport Internet traffic between continents at 20 different major points.
By Lucian Constantin | 25 November, 2013 13:02
A Boston-based company, Abine, is beefing its anti-tracking browser extension to let users shield their real credit card details, email addresses and phone numbers during web transactions.
By Jeremy Kirk | 22 November, 2013 05:30
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
By Tony Bradley | 11 November, 2010 07:42
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users
By Roger A. Grimes | 30 September, 2013 10:05
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
Our manager finds the time and opportunity to cross a few nagging items off of his to-do list.
By Mathias Thurman | 22 April, 2013 10:04
Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.