Hacking

In today's Internet-driven world of business, customer data -- traditionally the lifeblood of any enterprise -- takes on a new and frightening importance. On the one hand, businesses have to provide partners, staff and contractors access to data; on the other, they have to ensure that data does not ...

About 160,000 people may have had their personal data stolen during a computer security breach at the University of California at Berkeley. Affected groups include current and former UC Berkeley students and family members, as well as about 3,400 students of Mills College who received, or were eligi...

The woman who conducted a 60-day, top-to-bottom review of U.S. cybersecurity policy has said there needs to be more leadership on the issue from the very top -- the Obama White House. Melissa Hathaway, acting senior director for cyberspace for the National Security and Homeland Security councils, pr...

A report that foreign hackers have repeatedly penetrated the U.S. power grid computer network has delivered a loud wake-up call. Cyber-spies from countries including China and Russia have breached the electrical infrastructure's computer network and left software tools behind that would have allowed...

Think of it as the seamy underside of the bad economy: Harsh market conditions, corporate cost-cutting and a downsized, disgruntled workforce create the perfect storm for systematic and sophisticated attacks by underworld enterprises on data systems in respected companies worldwide. So here's what w...

Corporate network administrators can breathe a little easier as the world braces itself for what could be a massive Internet attack courtesy of the Conficker worm on April 1. International non-profit research organization The Honeynet Project, which works on Internet security, has come up with a new...

EXPERT ADVICE

Eliminating the Mobile Security Blind Spot

Office-bound workers at most companies today have a significant amount of IT security available to them when best practices are followed. Their computers are physically secure; their hard drives are hopefully encrypted; secure Web gateways, intrusion prevention systems and firewalls block dangers f...

Home computer users and small-business entrepreneurs usually know enough about broadband Internet security to protect their data with a firewall. In most of these cases, a single firewall at a point of entry to the computers or network is sufficient. Sometimes, though, using multiple firewalls is th...

A team of hackers exploited a SQL injection vulnerability to gain access to a customer database protected by security company Kaspersky. It appears the attack did not compromise any data, according to Roel Schouwenberg, a Kaspersky senior antivirus researcher. However, it certainly dealt a blow to t...

Data loss prevention: It's come to be one of the terms that we have become unusually familiar with. Data loss prevention isn't about the outright cessation of the loss of personal records; it's about reducing the risk to an acceptable level. There isn't a quadrant in health, finance, construction or...

Like every chief executive before him, President-elect Barack Obama will be making personal sacrifices as he assumes the role of U.S. president. He won't be able to stroll down a beach without the world watching. He will likely worry over how his daughters will adjust to living in a fishbowl. He may...

As malware writers and Internet attackers become more sophisticated, 2009 looks to be a year of more focused attacks by profit-driven criminals bent on stealing data from businesses, employees and consumers. Networking firm Cisco released its annual Threat Report Monday, citing a nearly 12 percent i...

EXPERT ADVICE

The Next Generation of Cyber-Threats

With each passing year, hackers come up with new ideas, or variations of past ideas, to combine technology and social engineering to deceive users and attack networks for their financial benefit. The mid-2000s saw the proliferation of botnet attacks used for spam, targeted attacks and worse, while 2...

The report is called "Securing Cyberspace for the 44th Presidency," and one paragraph in its opening section succinctly sets forth the Internet-related challenges awaiting President-elect Barack Obama. "Cybersecurity is now a major security problem for the United States," the Center for Strategic an...

A report released Tuesday from ScanSafe, a Software as a Service Web security provider, highlighted the energy industry as facing a high risk of exposure from Web-based malware. Companies within that sector have a 189 percent higher risk than other sectors of the economy, according to the security f...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

Technewsworld Channels