- Welcome Guest
- Sign In
As the United States' private and public sectors increasingly leverage the Internet, the U.S. intelligence community fears that they are severely endangering the country's critical infrastructure. On its own, neither the public nor private sectors can combat this threat, U.S. Director of National In...
Consumers are growing increasingly comfortable storing sensitive information on their computers, USB flash drives, and external hard drives, as well as using Web-based solutions to automate regular tasks such as shopping for holiday gifts, paying bills and tracking financial portfolios. At the same ...
Google is reportedly looking into the possibility that one or more staff members at its office in China helped enable the attack on its infrastructure in mid-December. After the attack was discovered, some Google China employees were denied access to internal networks, while others were put on leave...
Computer security companies are scurrying to cope with the fallout from the Internet Explorer flaw that led to cyberattacks on Google and its corporate and individual customers. The zero-day attack that exploited IE is part of a lethal cocktail of malware that is keeping researchers very busy. "We'r...
Facebook has partnered with McAfee to improve the social network's security measures. The arrangement will have McAfee remotely clean up Facebook subscribers' PCs if the social networking site detects that the computer is infected. These subscribers will also see an ad for a six-month free subscript...
I first became aware of cross-site scripting (XSS) nearly a decade ago. At the time, despite being an all too prevalent bug in Web applications, the risk posed by the flaw was of limited value. It was the go-to vulnerability for any pen tester that was having trouble digging up a meaningful vulnerab...
Social networking sites such as Facebook and MySpace rely on the trusted nature of the relationship between friends, colleagues, associates and followers. Unfortunately, the level of trust that end-users invest in each other is also being applied to the makers of applications and is perhaps a little...
Botnets embody the ultimate blended threat. Botnet code carries almost every conceivable form of malware -- from spyware to downloaders, rootkits, spam engines and more. To answer like with like, defenders must employ multiple layers of security. The good news is that time-honored techniques are sti...
I spend a good deal of my time meeting existing and potential customers, and from that, I believe two things are clear: First, the Internet is now fundamental to the operations of both public and private organizations; second, those organizations are increasingly concerned with threats and risks due...
British police on Wednesday announced the arrest of two people in the city of Manchester on suspicion of using the so-called ZeuS Trojan horse to commit banking fraud. The couple, who were detained Nov. 3, are out on bail pending trial. ZeuS, also known as "Zbot," is a notorious bit of malware used ...
Windows 7, which was publicly released Oct. 22, has been hit by at least two security flaws. One of these lets hackers execute code remotely; the other lets them trigger an infinite loop remotely, causing a kernel crash. Both are flaws in SMBv2, security researcher Laurent Gaffie, who posted details...
Cross-site scripting/SQL injection attacks have been blamed for numerous data breaches, perhaps most notably the nightmare of the Heartland Payment Systems data breach. This type of attack has been around for at least a decade. However, the growing popularity of Web 2.0 applications and the tendency...
According to ICANN chairman Peter Dengate Thrush, nobody but nobody controls the Internet. Not China, not Comcast, not your IT guy, not Clippy, nobody. The Final Boss of the Internet does not exist. But there does exist a nonprofit that governs Web addresses, and that's Dengate Thrush's organization...
Regardless of the agreements or disagreements on how individuals, companies and governments are to combat cybercrime, one fact stands true: Doing nothing is the worst posture to assume. Cyberrisk is as limitless as human determination, ingenuity and ignorance. As such, it is crucial we take the righ...
Microsoft released version 1.0 of Microsoft Security Essentials, a free basic anti-malware service from Redmond, on Tuesday. This replaces Microsoft's discontinued Live OneCare Security-as-a-Service offering. Live OneCare customers can move to Microsoft Security Essentials once their subscriptions e...