security: Attacks/breaches

Twitter's Two-Factor Authentication: 5 Reasons To Avoid
Two-step verification system has no provision for backup access or lost phones, doesn't address public username problem.

Should CIOs Hire Cyber Pinkertons?
If a full-on cyber war breaks out, what will your company do? Avoid the Internet or hire a cyber Pinkerton?

Twitter Two-Factor Authentication: Too Little, Too Late?
Two-factor authentication is a good step. But for securing many sites, Twitter included, it's not enough.

Boston Bombers Can't Elude City's Tech Infrastructure
Video surveillance played a key role in identifying the suspects in Monday's tragic Boston Marathon bombing, setting a precedent for increasing...

Laws Can't Save Banks From DDoS Attacks
A threat information-sharing bill wouldn't do much to help banks defend themselves against distributed denial of services (DDoS) attacks.

Spamhaus DDoS Attacks: What Business Should Learn
What should your company take away from this week's attacks? Lock down unsecured DNS repeaters being exploited by attackers and prep DDoS response...

Unpatched Remote Access Tools: Your Gift To Attackers
Three-year old "TeamSpy" espionage campaign should be a wake-up call. Lock down your remote-access tools, or else.

Password Police Cite Evernote Mistakes
Evernote used the wrong security method to store passwords, cryptography experts say. Unfortunately, it's a common error.

Evernote Breach: What It Means To Enterprise IT
Cloud naysayers will insist that this incident shows why we should never use the cloud. Give me a break.

Kill Passwords: Hassle-Free Substitute Wanted
Passwords keep proliferating, but do new technologies and approaches offer an alternative? Maybe.
Top Stories
-
WikiLeaks Offers Snowden Flight To Iceland
June 21, 2013WikiLeaks donations fund charter plane to bring NSA whistleblower Snowden to Iceland in asylum attempt.
-
CrowdStrike Falcon Traces Attacks Back To Hackers
June 18, 2013Startup that encourages playing offense on security launches cloud-based service to help businesses identify adversaries, mitigate attacks and...
-
Thumb Drive Security: Snowden 1, NSA 0
June 14, 2013Thumb drives helped NSA whistle-blower Edward Snowden transport top-secret data from the agency. If the NSA can't keep a lid on thumb drives, can you?
-
Bug Data Buys Businesses Intel From U.S. Government
June 14, 2013Thousands of businesses are reportedly exchanging information with the government on zero-day vulnerabilities and online threats in return for...
-
LulzSec Hacker Ryan Cleary To Be Released
June 13, 2013Release comes despite being convicted of possessing child porn images and serving only a portion of his sentence, leading hackers to suggest he's...
-
NSA Prism Relies Heavily On IT Contractors
June 11, 2013NSA whistleblower Snowden likely enjoyed access to Prism program details as a contracted NSA IT administrator. Systems administrators remain an...
-
Federal Agencies Graded On Cybersecurity
June 11, 2013White House report on cybersecurity goals shows agencies are making progress to keep federal IT systems safe, but they might miss 2014 targets.
-
Security Talk: 7 Ways To Make Users Listen
June 10, 2013Zeus reboot underscores the fundamental cause of many security breaches: Human error. Here's how to keep users listening when you talk security.
-
Android Trojan Looks, Acts Like Windows Malware
June 07, 2013Android Trojan "Odad.a" rivals Windows malware in the harm it can do to mobile device users, say experts.
-
Glasgow City Council Fined For Security Lapses
June 07, 2013Stolen laptops and repeated cases of unencrypted data top the list of the City of Glasgow's security failings.
More
News »
Slideshows
Resource Links
Top Story
Europe Weighs New Data Breach Rules For Critical Companies

Mobile networks, banks, energy companies and other critical infrastructure providers could be required to report all breaches to EU authorities.
More News
Related Webcasts
- Smarter Mobile Security: Securing BYOD
- Smarter Mobile Security: Minding the Gaps
- Sophisticated Attacks - A how to guide for keeping your organization secure
- High Performance Incident Response: How quickly can you detect threats to your endpoints?
- Endpoint Insecurity: How to Close Ranks Among Your Employees -- And Close The Gaps For Device-Related Data Breaches
This Week's Issue
Free Print Subscription
SubscribeCurrent Government Issue
- Anytime, Anywhere: Mobile applications are the new way to extend government information and services to on-the-go citizens and employees.
- Big Changes For U.S. Intelligence: New initiative aims to shift the 17-member Intelligence Community from agency-specific IT silos to an enterprise environment of shared systems and services.
- Read the Current Issue