intrusion - News, Features, and Slideshows
Researchers are gearing up to hack an array of different home routers during a contest next month at the Defcon 22 security conference.
By Lucian Constantin | 19 July, 2014 02:07
Nine of Cisco's home and small office cable modems with router and wireless access point functionality need software updates to fix a critical vulnerability that could allow remote attackers to completely compromise them.
By Lucian Constantin | 17 July, 2014 22:13
The scope of a recent security breach at a digital certificate authority (CA) controlled by the Indian government is bigger than initially thought and also targeted domain names owned by Yahoo, in addition to several owned by Google.
By Lucian Constantin | 11 July, 2014 01:22
Thousands of compromised computers are actively trying to break into point-of-sale (POS) systems using brute-force techniques to guess remote administration credentials.
By Lucian Constantin | 10 July, 2014 03:06
A sophisticated Chinese hacker group that had been stealing information from U.S. policy experts on Southeast Asia suddenly changed targets last month to focus on Iraq, security researchers said Monday.
By Gregg Keizer | 08 July, 2014 17:39
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
By Roger A. Grimes | 04 November, 2013 15:13
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
Smart companies use DevOps to speed the rollout and quality of new apps and services to market. See the findings from a survey of 1300 global IT leaders in this snack-sized infographic including the real benefits a good DevOps strategy can bring to your business.
- Apple hit with class action lawsuit for alleged labor rule violations
- Telstra to kill 2G services
- Seafaring robot shrugs off monster Typhoon Rammasun
- Zero-day flaws in Tails aren't for sale, vulnerability broker says
- Apple grows Mac sales by 18 per cent on the back of the MacBook Air
- Rules of engagement needed for the Internet: RSA
- How Nokia both helped and hindered Microsoft's earnings
- Vodafone upbeat on turnaround despite more customer losses
- Five takeaways from the Apple earnings call
- More mobile gadgets than people? Seven countries - including Australia - now qualify
- Apple "inadvertently admitted" to iOS backdoor: forensics expert
- Juniper jettisons mobile security business
- TOR patch coming
- Microsoft revenue lifted by Cloud sales to businesses
- ARM develops second wave of 64-bit processors