intrusion - News, Features, and Slideshows
With their own dedicated processor and operating system, LTE/3G modems built into new business laptops and tablets could be a valuable target for hackers by providing a stealthy way to maintain persistent access to an infected device.
By Lucian Constantin | 10 August, 2015 04:20
Travel industry software maker Sabre is the latest company said to have been hit by the same hackers who recently attacked U.S. health insurer Anthem and the U.S. Office of Personnel Management (OPM), while American Airlines has been investigating its own systems for evidence of a similar breach.
By Katherine Noyes | 08 August, 2015 03:36
An attack using the SMB file sharing protocol that has been believed to work only within local area networks for over a decade can also be executed over the Internet, two researchers showed at the Black Hat security conference.
By Lucian Constantin | 08 August, 2015 01:39
The hacking group that targeted unclassified email systems at the U.S. Department of State and the White House is believed to have also compromised a network used by the Joint Chiefs of Staff, a body of senior U.S. military leaders.
By Martyn Williams | 07 August, 2015 08:47
File synchronization services, used to accommodate roaming employees inside organizations, can also be a weak point that attackers could exploit to remain undetected inside compromised networks.
By Lucian Constantin | 05 August, 2015 21:03
After the Office of Personnel Management breach, medical data was labeled as the "<a href="http://www.reuters.com/article/2015/06/05/cybersecurity-usa-targets-idUSL3N0YR30R20150605">holy grail</a>" for cybercriminals intent on espionage. "Medical information can be worth 10 times as much as a credit card number," reported Reuters. And now to steal such information, hospital networks are getting pwned by malware-infected medical devices.
By Darlene Storm | 09 June, 2015 02:31
Follow me, if you will, on a journey back in time to just one year ago. As 2013 turned into 2014, the information security industry was buzzing about the latest spate of breaches. Target had ushered in a new era of retail security breaches, with 40 million card numbers lost to the hackers. Little did we know at the time that this was just the beginning, and small potatoes in comparison to what was to come. One year ago, Neiman Marcus and Michaels had joined Target, and <a href="http://www.computerworld.com/article/2487265/security0/security-manager-s-journal--cyberattacks-just-got-personal.html">I wrote in response to the growing number of breach disclosures</a> that "in fact, I have to wonder which retailers have <em>not</em> suffered breaches. The word on the street is that at least a half-dozen other retailers were compromised in the past few months, without publicity." Sadly, this turned out to be true. I hate being right all the time.
By By J.F. Rice | 12 February, 2015 05:01
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
By Roger A. Grimes | 04 November, 2013 15:13
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- FTSystems Administrator/Engineer | $60-90K package | Northern BeachesNSW
- CCDBA (Oracle/SQL)NSW
- FTHelpdesk support - Level 1VIC
- CCInformatica ExpertNSW
- CCInformation Security ManagerNSW
- FTIT Technical LeadVIC
- CCLync/Skype EngineerNSW
- CCContract Programmer (Crystal Reports/JAVA/SQL) 160129/P/vhs-cAsia
- FTProject Manager | SharePoint, Office 365 SkillsVIC
- CCSolution Architect - .NET environmentACT
- CCHybris Developer - Global Digital AgencyNSW
- CCFront End DeveloperVIC
- FTSenior Consultant | Project work | National Systems IntegratorNSW
- FTAxway API DeveloperNSW
- CCWeb Content WriterSA
- FTOracle System Integration Engineer - CANBERRASA
- FTFull Stack & Mobile EngineersNSW
- CCContract System Analyst (JAVA/J2EE/SQL) 160205/SA/881Asia
- CCAutomation QAVIC
- CCContract Analyst Programmer (JAVA/Oracle/UNIX) 160203/AP/381Asia
- FTSystems Administrator/Engineer | Projects & BAU | Coastal Newcastle NSWWA
- CCContract System Engineer (Lotus Domin) 160129/SE/vccAsia
- CCMid to Senior Level User Experience SpecialistsNSW
- FTCyber Security SpecialistNSW
Organisations are struggling with a torrent of data thanks to cloud computing, mobility and the Internet of Things. And conventional backup and recovery methods are failing. This white paper outlines the benefits of a modern approach to disaster recovery.
- Modular cellphone kit can be used for IoT and wearables
- Dragula looks to take the bite out of drag-and-drop
- Mozilla sets kill date for Firefox OS on phones
- LTE-U’s cold war may be thawing, as field testing commences ahead of summit
- Now that AI has mastered 'Go,' are all our jobs next?
- Make a $40 Linux or Android PC with new Raspberry Pi 2 rival
- Researcher finds serious flaw in Chromium-based Avast SafeZone browser
- Fed up with bogus computer support calls, man turns tables on scammers
- Dridex banking malware mysteriously hijacked to distribute antivirus program
- SamsaraJS: Famo.us fork juices mobile Web UIs
- UN panel backs WikiLeaks' Julian Assange, but he may not go free
- The Neutrino exploit kit has a new way to detect security researchers
- 7 smartphone trends to watch this year
- What businesses need to know about Privacy Shield
- Box makes it easier for businesses to control encryption of cloud data