intrusion - News, Features, and Slideshows
- Security vendor coalition cleans 43,000 malware infections used for cyberespionage
- Drupal: If you weren't quick to patch, assume your site was hacked
Users of Drupal, one of the most popular content management systems, should consider their sites compromised if they didn't immediately apply a security patch released on Oct. 15.
By Lucian Constantin | 31 October, 2014 01:50
Since 2011 a group of attackers has been targeting companies that operate industrial control systems with a backdoor program called BlackEnergy.
By Lucian Constantin | 30 October, 2014 01:51
A coalition of security vendors has disrupted the activities of a sophisticated group of attackers tied to China that, over the past six years, infiltrated the computers of many Fortune 500 companies, journalists, environmental groups, software companies, academic institutions, pro-democracy groups and government agencies around the world.
By Lucian Constantin | 29 October, 2014 03:05
One of the first things a malware analyst does when encountering a suspicious executable file is to extract the text strings found inside it, because they can provide immediate clues about its purpose. This operation has long been considered safe, but it can actually lead to a system compromise, a security researcher found.
By Lucian Constantin | 28 October, 2014 02:24
Network-attached storage (NAS) devices are riddled with vulnerabilities that can put the security of sensitive data and networks at risk, a researcher has found. To prove his point, he has created a proof-of-concept worm that can infect devices from three different manufacturers.
By Lucian Constantin | 21 October, 2014 03:11
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
By Roger A. Grimes | 04 November, 2013 15:13
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
- FTDigital Performance Manager - MediaNSW
- FTDigital Marketing CoordinatorNSW
- FTStudio Design ManagerVIC
- FTClient Service Director - Search: SEO & PPCNSW
- FTSenior SEO ManagerNSW
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTAccount Manager - DataNSW
- FTChief Information Officer - CSIROACT
Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
- Sharp smartband LCD uses 1,000 times less power
- HP's move into 3D printing will radically change manufacturing
- Hungary ditches Internet tax plans after protests
- Sony's new mobile chief has hands full as handsets struggle
- IBM joins Tencent to target China's growing enterprise cloud market
- Samsung attacks Chinese rivals with new mid-range Galaxy phones
- FCC's Wheeler said to mull hybrid approach to net neutrality
- Some Aussie businesses using DevOps to improve customer engagement and reduce IT spend: report
- The Google shakeup continues: Andy Rubin is out
- Google project aims to preserve privacy when collecting software stats
- Major banks ready their own mobile payment apps
- Android creator Andy Rubin leaving Google
- Data retention is necessary red tape: Turnbull
- Zuckerberg to connect with regular folk in first 'community Q&A'
- In Pictures: 12 shocking social media horror stories