intrusion - News, Features, and Slideshows
- Synology patches serious flaws in its network-attached storage devices
- Large scale attack hijacks routers through users' browsers
Network-attached storage (NAS) manufacturer Synology fixed several vulnerabilities in its devices' software, one of which could allow attackers to compromise the data stored on them.
By Lucian Constantin | 27 May, 2015 00:45
Cybercriminals are targeting employees who browse the Web or check their email from point-of-sale (PoS) computers, a risky but unfortunately common practice.
By Lucian Constantin | 26 May, 2015 02:02
Cybercriminals have developed a Web-based attack tool to hijack routers on a large scale when users visit compromised websites or view malicious advertisements in their browsers.
By Lucian Constantin | 25 May, 2015 21:26
Networking device manufacturers ZyXEL Communications and Netgear have confirmed that some of their routers are affected by a recently disclosed vulnerability in a USB device-sharing service called NetUSB.
By Lucian Constantin | 22 May, 2015 02:42
Millions of routers and other embedded devices are affected by a serious vulnerability that could allow hackers to compromise them.
By Lucian Constantin | 20 May, 2015 07:02
Follow me, if you will, on a journey back in time to just one year ago. As 2013 turned into 2014, the information security industry was buzzing about the latest spate of breaches. Target had ushered in a new era of retail security breaches, with 40 million card numbers lost to the hackers. Little did we know at the time that this was just the beginning, and small potatoes in comparison to what was to come. One year ago, Neiman Marcus and Michaels had joined Target, and I wrote in response to the growing number of breach disclosures that "in fact, I have to wonder which retailers have not suffered breaches. The word on the street is that at least a half-dozen other retailers were compromised in the past few months, without publicity." Sadly, this turned out to be true. I hate being right all the time.
By By J.F. Rice | 12 February, 2015 05:01
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
By Roger A. Grimes | 04 November, 2013 15:13
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
Technology is constantly evolving, with change accelerating seemingly overnight. At the same time, more than 70 percent of companies process more than half of their invoices – and organizations in general pay most of their bills – the old-fashioned way, on paper. See the research that suggests that more executives would embrace AP automation if they could quantify the return on investment, why paper-based processes pose risks and waste which can be eliminated with AP automation and how AP automation solutions utilise and extend a company’s existing IT infrastructure investments.
- Lenovo shows smartphone that lets users interact with projected content
- Government hopes to pass site-blocking legislation next month
- Apache Cordova fixes flaw that could cause apps to crash
- MacTel strikes leaseback arrangement for Intellicentre 2 data centre
- Wi-Fi access point scans can betray a person's location
- Biometrics funding to help deliver identity assurance, Dutton says
- ISPs, rights holders continue negotiations over anti-piracy code costs
- Lenovo's new Windows 10 tablet to arrive in August
- Woolworths to resell services on Telstra's network
- After medical marijuana, Sidecar eyes alcohol and pharmaceuticals
- CA gets 'agile' with $US480 million purchase of Rally
- The cost of a data breach has jumped 23 per cent in two years
- GM to offer both Apple CarPlay and Android Auto on most vehicles
- Judge classifies as class action an email scanning lawsuit against Yahoo