Hacking

THIS WEEK IN TECH

The E-Book Empire Strikes

Apple held most of the music industry virtually at knifepoint for years, and that wasn't necessarily a bad thing, especially if you were a consumer who wanted a legal way to get popular music at a fairly reasonable price. It was only about a year ago that iTunes let go of its dollar-store policy and...

As the United States' private and public sectors increasingly leverage the Internet, the U.S. intelligence community fears that they are severely endangering the country's critical infrastructure. On its own, neither the public nor private sectors can combat this threat, U.S. Director of National In...

Twitter users have come under attack from scammers once again, and the microblogging site has asked several users to reset their passwords. This latest attempt came through torrent file-sharing sites that contained hidden security exploits and backdoors. Opinion is divided as to whether these securi...

Following a breach of its computer systems a year ago, Heartland Payment System, one of the five largest payment card processors in the United States, came under considerable pressure to strengthen its IT security, and it's been embroiled in several lawsuits because of the breach. In January 2009, h...

Google is reportedly looking into the possibility that one or more staff members at its office in China helped enable the attack on its infrastructure in mid-December. After the attack was discovered, some Google China employees were denied access to internal networks, while others were put on leave...

Data leakage prevention is a topic that has been getting a lot of attention lately. Keeping sensitive data from leaving the network has quickly risen to the top of many IT and compliance officers' lists of priorities. DLP will likely be the first thing most organizations spend their 2010 information...

EXPERT ADVICE

5 Tips for Managing IT and Physical Access

Entering a physical facility should be just as secure as logging onto a PC. Security professionals often find themselves hard-pressed to secure both physical and logical assets. So why are so many organizations behind the curve when it comes to managing physical and logical access? There are dozens...

Twitter had a service outage Friday morning because its DNS servers were compromised. It was done by a hacker or group of hackers self-identified as the "Iranian Cyber Army." The group also took over the Iranian opposition Web site mowjcamp.org. Twitter is investigating the issue, said company cofou...

EXPERT ADVICE

Winning the Botnet Wars

Botnets embody the ultimate blended threat. Botnet code carries almost every conceivable form of malware -- from spyware to downloaders, rootkits, spam engines and more. To answer like with like, defenders must employ multiple layers of security. The good news is that time-honored techniques are sti...

EXPERT ADVICE

Your Log Records Have an Important Message for You

I spend a good deal of my time meeting existing and potential customers, and from that, I believe two things are clear: First, the Internet is now fundamental to the operations of both public and private organizations; second, those organizations are increasingly concerned with threats and risks due...

With the United Nations Climate Change Conference in Copenhagen just a few weeks away, leading scientists on the topic probably had a lot of work they would have liked to accomplish this week. That hasn't been possible, however, thanks to the recent anonymous theft of thousands of emails and documen...

Thousands of emails and documents were stolen from a prominent climate research center in the UK recently and posted online, firing up a fresh controversy over global warming. More than 1,000 emails and several thousand documents were apparently included in the hack attack on the University of East ...

The Information Security Forum may bill itself as the world's leading independent authority on IT security, but the companies and agencies that its members work for are finding themselves more dependent than ever on its computer security expertise. Current trends that are expanding access to network...

The Drums of Cyberwar

The world's increasing reliance on information technology, combined with the growing sophistication of cybercriminals and cyberattacks, is leading to a sort of cyber-cold war, according to a new report from computer security research firm McAfee. For example, Estonian government and commercial Web ...

EXPERT ADVICE

Back to Basics: 5 Things IT Could Do Better in 2010

Well, it's November again -- which means that it's just about time for this year's set of New Year's predictions. Every year around this time, everyone from antimalware companies to analyst firms line up to tell us about the top IT and security trends -- what they are and why we should care. This ...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

Technewsworld Channels