Hacking

The Rise of Cybervigilantism

Things took an interesting turn in the aftermath of Cablegate, which saw 250,000 documents, many of them sensitive, put on the open Web by WikiLeaks. Julian Assange, the founder of the site, has been charged by Swedish police with a sex crime; the U.S. government is seeking to try Assange, who's cur...

Hackers struck at the Gawker blog network's servers over the weekend, stealing more than 1 million rows of data, including cracked passwords. Gawker has been scurrying to revamp security on its servers as a result, and has put up an FAQ page on this issue. Meanwhile, Twitter has been hit with a wave...

Cyberattacks this week by supporters of Wikileaks on the home sites of Visa and MasterCard may have been designed to grab headlines rather than actually disrupt the companies' financial operations. The wave of electronic assaults, referred to as "Operation Payback" by the activists mounting the atta...

The security community was horrified when it learned about Stuxnet, the worm designed to eat into industrial control systems, or SCADA systems, that was purportedly targeted at Iran's Bushehr nuclear reactor. Not only was the worm highly sophisticated, but it also targeted a SCADA system from Siemen...

Wikileaks, the controversial site that has caused a worldwide diplomatic furor by dumping nearly 250,000 documents covering private United States diplomatic communications, has reportedly moved to the Amazon cloud. The release of the documents, collectively dubbed "Cablegate," has sparked outrage. W...

The end of Thanksgiving means the beginning of holiday shopping season, and as usual, a great deal of that shopping will be done online. But while online shopping is easy and convenient, it's also fraught with dangers. Sure, it's easy to search the Web for the best price on that laptop or video gami...

China Telecom has reportedly denied accusations by a U.S. government organization that it was behind the rerouting of 15 percent of the world's Web traffic to servers in China for a short period earlier this year. The Chinese state-owned carrier was pinpointed by the U.S.-China Economic and Security...

EXPERT ADVICE

5 Tokenization Myths Debunked

I have a confession to make: I'm a tokenization junky. I live and breathe tokenization, and have been for a few years now. Since I'm serving as lead chair on the PCI Security Standards Council's Tokenization Working Group, it's my job to know everything about tokenization that's going on in the indu...

Managing a data center is more complicated than ever with the growing sophistication and interconnectedness of enterprise applications, networks and now private and public cloud resources. The challenges created by these interwoven infrastructures are difficult to overcome without the right tools. O...

EXPERT ADVICE

Time to Dust Off That Breach Disclosure Plan

As we should probably realize by now, not all tasks are created equal -- especially when it comes to making mistakes. For most of the things we do -- from brushing our teeth to typing an email -- making a mistake is usually relatively innocuous. Sure, we might have to clean a bit of the toothpaste ...

Facebook has unveiled new measures to keep members secure when they log into its site. One is a temporary password; another is letting people sign out of Facebook remotely. Finally, it will also now regularly prompt members to update their security information. "Our new features are aimed at protect...

Microsoft's vice president of trustworthy computing, Scott Charney, has put the call out for a collective, coordinated approach to protecting the public from, among many other threats, botnets. The worldwide Internet community would do well to apply a public health approach to battling the viruses a...

As businesses seek new ways to cut costs, IT departments are often placed on the hot seat, and that has fueled interest in virtualization. For example, VMworld 2010, held in San Francisco recently, drew more than 17,000 attendees and saw more than 145,000 virtual machines deployed. However, as busin...

Trend Micro on Tuesday announced an agentless antimalware module for VMware virtual environments in its Deep Security 7.5 product. The company also announced on Tuesday that it's throwing open its Trend Micro SecureCloud beta to the public. Both products will protect data in the virtual environment ...

Imagine this situation: A coworker calls you in a panic. He's facing a fast-approaching deadline, and you are the only person who can help him succeed in getting some critical task done. This hypothetical coworker explains to you what he's working on and how it's critical to the success of the orga...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

Technewsworld Channels