intrusion - News, Features, and Slideshows
The Chinese government says accusations that it was involved in cyberattacks against U.S. transportation contractors are "totally groundless and untenable."
By Martyn Williams | 19 September, 2014 02:59
The U.S. Defense Department plans to tighten reporting of cyber incidents against transportation contractors after the military found it was mostly left in the dark about successful attacks from China, according to a Senate report.
By Jeremy Kirk | 18 September, 2014 11:51
There's no need to panic about the nearly five million compromised Gmail passwords that appeared in a Russian Bitcoin security forum this week, according to Google.
By Sharon Gaudin | 12 September, 2014 03:31
Security experts are urging Gmail users to change their passwords amid reports that hackers gained access to the credentials of 5 million users of the free email service. Some password combinations have been spotted on Russian cybercrime forums.
By Sharon Gaudin | 11 September, 2014 07:44
After nearly a week of investigation, Home Depot on Monday confirmed that intruders had indeed broken into its payment networks and accessed credit and debit card data belonging to an unspecified number of customers who shopped at its U.S. and Canadian stores.
By Jaikumar Vijayan | 09 September, 2014 08:23
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
By Roger A. Grimes | 04 November, 2013 15:13
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
BIG-IQ Security makes it easy to manage the entire firewall policy life cycle. Read about the key benefits and download the policy auditing and security compliance report today
UXC Connect’s Jesmond Psaila says that DevOps can do for IT operations what Agile did for software development. This paper demonstrates how, by combining both approaches, you can significantly improve operational efficiency and time-to-market. • Marketing and development teams want to constantly change or increase functionality, while IT operations teams want to keep the environment as stable as possible • Agile software development and virtualisation have not solved the time-to-value problem faced by marketing and IT operations teams • Recent movements in DevOps aim to address and redefine a more agile service management platform, while new tools have vastly improved functionality to configure and automate common processes
- IEEE standards group wants to bring order to IoT
- InfiniDB going out of business, but its database will live on as open source
- FCC questions how to enforce net neutrality rules
- iPhone 6 review roundup -- the raves come quietly
- Alibaba shares open at a high $92.70
- New organization sets out to make secure communication tools more user-friendly
- Tim Cook launches iPhone 6 sales in Palo Alto
- HP leapfrogs Red Hat to become top contributor to OpenStack
- New iPhone 6 and 6 Plus are easier to repair
- Shut out on iPhone 6 Plus, buyers settle for smaller version
- Screen size matters to Apple fans in line for the iPhone 6
- Half-baked mergers
- Ping Identity picks up $35 million more in venture funding
- Apple's iOS 8 fixes enterprise Wi-Fi authentication hijacking issue
- Watch video of the first iPhone 6...being dropped