intrusion - News, Features, and Slideshows
Network-attached storage (NAS) devices are riddled with vulnerabilities that can put the security of sensitive data and networks at risk, a researcher has found. To prove his point, he has created a proof-of-concept worm that can infect devices from three different manufacturers.
By Lucian Constantin | 21 October, 2014 03:11
Isolating computers from the Internet, called "air gapping," is considered one of the best ways to defend critical systems and their sensitive data from cyberattacks, but researchers have found that can be undermined using an all-in-one printer.
By Lucian Constantin | 17 October, 2014 03:03
When an employee turns on his own company, the results - damaged networks, data theft and even work stoppage - could be devastating.
By Sharon Gaudin | 14 October, 2014 21:16
A leaked programming manual for interacting with the physical components of automated teller machines might have helped attackers create malware programs that were used to steal cash from ATMs in various parts of the world this year.
By Lucian Constantin | 10 October, 2014 01:42
The leader of the now-disbanded LulzSec hacking group directed members to attack targets in dozens of countries, including the U.K., Turkey, Brazil and Australia, even as he was serving as an FBI informant, according to a news report.
By Grant Gross | 02 October, 2014 07:12
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
By Roger A. Grimes | 04 November, 2013 15:13
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
Benefits based on Forrester Consulting Study “The Total Economic Impact of Converging SAP Landscapes on Vblock™ Systems”
Although government agencies invest large sums of money into their IT defenses, an unknowing user can help adversaries dethrone even the most regal of security systems, that's why proper precautions are needed in expanding your mobile strategies. Read more
- Wireless price war's good for consumers, but challenges carriers
- Apple Pay tops Tim Cook's to-do list in China
- The ratings: Most net neutrality groups get poor grades for funding transparency
- Advocacy groups accused of obscuring corporate ties in net neutrality debate
- Secretive funding fuels ongoing net neutrality astroturfing controversy
- OS X Yosemite uptake climbs to 13% in first week
- Researcher works to make 3D-printed metals stronger, customizable
- Court shuts down alleged PC tech support scam
- New material could lead to longer-lasting batteries
- RiteAid blocks Apple Pay, Google Wallet
- Senator wants Whisper to explain how it tracks users, shares their data
- Apple hands 8 execs stock awards worth up to $27M
- Neural networks draw on context to improve machine translations
- Toshiba Chromebook 2 review: An attractive Chrome OS experience
- The 'Backoff' malware linked to data breaches is spreading