intrusion - News, Features, and Slideshows
A hacker extracted customer log-in credentials from a server owned by Bitdefender that hosted the cloud-based management dashboards for its small and medium-size business clients.
By Lucian Constantin | 31 July, 2015 23:40
The cyberespionage group that stole the personal records of millions of Americans from U.S. health insurer Anthem and the U.S. Office of Personnel Management (OPM) has also reportedly breached United Airlines.
By Lucian Constantin | 30 July, 2015 20:14
The vast majority of Android phones can be hacked by sending them a specially crafted multimedia message (MMS), a security researcher has found.
By Lucian Constantin | 27 July, 2015 22:40
Security researchers published limited details about four unpatched vulnerabilities in Internet Explorer because Microsoft has not moved quickly enough to fix them.
By Lucian Constantin | 24 July, 2015 03:12
Italian surveillance software maker Hacking Team recently claimed that it hasn't lost any customers after the massive leak of its internal data two weeks ago. But it has lost at least one business partner: U.S.-based penetration testing specialist and zero-day exploit broker Netragard.
By Lucian Constantin | 22 July, 2015 02:13
After the Office of Personnel Management breach, medical data was labeled as the "holy grail" for cybercriminals intent on espionage. "Medical information can be worth 10 times as much as a credit card number," reported Reuters. And now to steal such information, hospital networks are getting pwned by malware-infected medical devices.
By Darlene Storm | 09 June, 2015 02:31
Follow me, if you will, on a journey back in time to just one year ago. As 2013 turned into 2014, the information security industry was buzzing about the latest spate of breaches. Target had ushered in a new era of retail security breaches, with 40 million card numbers lost to the hackers. Little did we know at the time that this was just the beginning, and small potatoes in comparison to what was to come. One year ago, Neiman Marcus and Michaels had joined Target, and I wrote in response to the growing number of breach disclosures that "in fact, I have to wonder which retailers have not suffered breaches. The word on the street is that at least a half-dozen other retailers were compromised in the past few months, without publicity." Sadly, this turned out to be true. I hate being right all the time.
By By J.F. Rice | 12 February, 2015 05:01
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
By Roger A. Grimes | 04 November, 2013 15:13
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
Cloud, big data and analytics, mobile, social, and IT security have impacted networking – bringing it almost to breaking point. This whitepaper looks at the future of networking to accommodate these evolving trends.
Identity and Access Governance is often used in reaction to demands from auditors. However, thinking of governance as only a means to pass audit is short-sighted. Failure to proactively manage user access to sensitive resources puts you at risk for sabotage, fraud, data breaches and financial penalties. In this whitepaper you'll learn: if your governance program is proactive or reactive, what to look for when searching for a solution to help you reduce risk.
- Apple falls to third in China smartphone rankings, while Xiaomi vaults ahead
- Cleaning up botnets takes years, if ever, to complete
- Yahoo tackles large 'malvertising' campaign in its ad network
- Beat the Q Posse Group raises $5m
- Cisco's SDN controller has a security hole
- OneDrive finally lets you sync shared folders
- Condé Nast parent company jumps into big data market with 1010data purchase
- HoloLens for the enterprise due within a year
- Bad vibe brews about Windows 10
- US counterterrorism expert says it's time to give companies offensive cybercapabilities
- Patch halt looms for half of all IE users
- IBM applies some engineering rigor to the Internet of Things
- AT&T launches wireless data and TV services on one bill
- Will Facebook envy wreck Twitter?
- Clinton plan to power U.S. homes with renewable energy in 10 years is doable