intrusion - News, Features, and Slideshows
The FBI today named the North Korean government as responsible for the cyber attack against Sony Pictures last month, saying its technical analysis points to the isolated, Communist country.
By Gregg Keizer | 20 December, 2014 07:27
A critical vulnerability in client software used to interact with Git, a distributed revision control system for managing source code repositories, allows attackers to execute rogue commands on computers used by developers.
By Lucian Constantin | 19 December, 2014 21:40
A serious vulnerability in an embedded Web server used by many router models from different manufacturers allows remote attackers to take control of affected devices over the Internet.
By Lucian Constantin | 19 December, 2014 06:16
A malware program dubbed Spark that steals payment card data from compromised point-of-sale (POS) systems is likely a modification of an older Trojan called Alina, and highlights a continuing, lucrative business for cybercriminals.
By Lucian Constantin | 19 December, 2014 03:29
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
By Roger A. Grimes | 04 November, 2013 15:13
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
Communications service providers (CSPs) are struggling with an explosion of data traffic resulting from increased mobile usage, streaming video, resource-intensive over-thetop (OTT) applications, and smart device proliferation. At the same time, CSPs must deploy new network technologies and services to stay competitive and satisfy customers.
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright
- FBI concludes North Korea 'responsible' for Sony hack
- What we know about North Korea's cyberarmy