Hackers have found a new target in Microsoft. The software giant experienced a similar cyberattack when a small number of its computers were subject to malicious software
Android, Google's mobile operating system, is a target for mobile malware according to a report recently compiled by Blue Coat Systems
Officials say hackers pose a threat to the nation's economy and accuse China of carrying out the most cyber-attacks. Some estimates put the cost to the U.S. economy at tens of billions of dollars each year
Social media giant Twitter says it was hacked recently, in a sophisticated cyber attack that exposed the passwords and other information of about 250,000 users
Computer crime could soon pose a greater threat to world security than terrorism. Our author analyses the problem and looks at the ambivalent attitude of states towards countering it
Much of the global cyber threat -- whether this is to critical infrastructure, the economy or the security of individuals -- takes the form of attacks on organizations outside government control
How to deploy encryption when its performance might otherwise be impractical
Here's how enterprises and developers should be rethinking their assumptions about Linux platform and device security
My 79-year-old father looked at me through tears of frustration, staring at his PC. In just 24 hours, he had been shunned by dozens of people who, up until now, he thought were his friends
Author of controversial cyber espionage bill says it would let U.S. stop predators, not spy on its own
A carefully crafted information-sharing program that includes robust privacy safeguards could be an effective approach to cybersecurity, CISPA lacks such protections for individual rights
There is a need for cybersecurity legislation, but CISPA -- an overly broad bill that lacks restrictions on government abuse -- is not the right way to achieve it
CISPA represents the best, most flexible, and effective approach to developing a more robust and responsive cybersecurity infrastructure
A chief officer with a leading cybersecurity company says hackers are rapidly setting their sights on Android, and it could cost users thousands of dollars in unwanted text messages
Multicore processers are increasingly common in everything from PCs to smartphones -- and increasingly attractive to hackers. Robert Watson explains the threats and how to mitigate them
Here's how security experts combine hardware and software techniques for a new layer of protection
Data breaches threaten not only your customers' information, but your company's reputation too. Here's how to create a strong security policy to protect stored data
You might not face the same scrutiny as Apple when it comes to customer privacy, but you still have to plan, says data security expert Tsahy Shapsa
Here's what you need to do to keep your data safe when you're connecting to the cloud via free public Wi-Fi
If your home office is your work headquarters, then the Web is the key to your success. Check out these strategies to secure your devices to prevent data loss and virus invasions
Employees using their own smartphones for work? Here's how to cope, says this mobile expert.
Business schools train grad students to handle security breaches and protect customer data
Do you know where your data is? For your company's safety, it's critical to know how employees are using the cloud
Cloud computing provides numerous benefits, including cost savings. Here's how to avoid creating security risks in the process
Russia currently holds the dubious distinction of being the world's top source of Internet attack traffic. Russian-based IP accounts drive 10 percent of attacks, most of which target port 445.
A new botnet called TDL-4 might be indestructible, according to security researchers at Kaspersky Lab
As long as consumers take a few basic steps to help protect their information, security experts agree that online banking remains safe. Here are 10 steps consumers to take to make sure their information is safe
The prolonged PSN downtime was a result of hackers, and consequently Sony announced that everyone's PSN screen name, real name, address, email, birth date and password had been compromised.
Near-field communication, while not new, is becoming a hot buzzword among tech-savvy consumers and businesses alike. This short-range wireless radio technology can turn a smartphone into a digital wallet, but that's just one of many potential uses
When it comes to social malware, you're only as secure as your most gullible employee. By now, even the most gullible employees will probably not fall for email-based phishing schemes. But social media, thanks to its newness, is another story
Free Wi-Fi connections can be tempting for traveling employees. And hey, you can't blame them, as one less item on an expense report can make them look better -- especially if your company is tightening its belt. But talking to them about the risks can help protect them -- and you
You're ready to drive that new minivan off the lot when the salesperson gives you the bad news: You didn't qualify for the loan. He shows you your credit report with numerous unpaid accounts. Until today, you thought you had perfect credit. Sounds scary, but don't pull the plug on your computer just yet. You can reduce the risk of online identity theft by taking these steps
Consumers now buy more laptops than desktop PCs, relishing the power they pack in a portable package. Thieves relish laptops for the same reason. The overwhelming majority of lost or stolen notebooks don't make it back to their owners, according to FBI and analyst reports. But a few laptop-luggers take steps to protect their investments, or the even-more precious data they contain.
Scammers are getting creative, moving past the good ol' 'stuck-in-Nigeria-need-money' scam. Here's how to stay ahead of them
New research shows the increasing dangers kids face online. Here's how you can help
Your biggest security threat might already be inside your firewall, says expert Chip Tsantes. Here's how to combat insider attacks
Given the growing popularity of smartphones and tablets, criminals' interest is increasing too, bringing with it a bigger threat of loss, theft and exposure to viruses and malware. Fortunately, there are plenty of security measures you can take to stay safe. Check out these five strategies -- and corresponding apps -- to help you carry them out
The litany of breaches, thefts and damage continues with ominous regularity, but why is cyber security such a difficult arena in which to make progress? Is it something that can be solved or must we learn to accept a measure of insecurity?
Google's much-hyped Chrome OS notebook is just a few months away, promising to deliver a lean, minimalist approach to mobile computing. Fast startup time, long battery life thanks to lower power consumption, and a heavy emphasis on cloud computing add up to plenty of interest from businesses of all sizes. But will this new operating system mean fewer security headaches?
Good security controls are vital, and we work daily to advance ours. First and foremost, we recognize the high risk of mobile devices and take steps to encrypt laptops, tablets, desktops and mobile phones. We also have a set security plan in place to prevent data breaches and ensure safety
Thanks to their small size, low cost, and capability of instant backup and file transportation between multiple computers, USB drives actually pose significant security threats for businesses. You should take several precautions to minimize the risk of data theft or malware attacks via USB drives. Consider the following
We have been monitoring cloud offerings for a while now, and when I stepped down as CIO in December, we were planning to get our toes wet by moving our Microsoft Exchange email services to the cloud. We're still very cautious about moving any customer financial service systems to the cloud or integrating our offerings into legacy financial services systems that house customer data
An effective data security policy is critical now more than ever, as data is increasingly stored in a variety of devices. To prevent theft of sensitive assets, it's critical to follow security best practices and adhere to a set data security policy. Here's what to consider when creating one for your company
The days when social networks were just for teens are long over: Adults now take up social networking for fun and business alike. To get the most out of your favorite social networks, it's important to be aware of how to protect your online privacy. Here's how to share safely
Who is to keep cyberspace safe? Should governments bear the burden and what can society do to protect against virtual threats?
Washington moved into damage-control mode, as news organizations published explosive excerpts from a trove of 251,287 stolen State Department cables published by the website WikiLeaks. WikiLeaks founder Julian Assange justified the publication with claims that the archive shows that the United States is duplicitous in its dealings with the world
If you get an E-mail from the IRS asking you to visit a website because of a problem with your tax return, ignore it: It's a scam. Reports of this kind of 'phishing fraud' have popped up throughout the country in recent weeks. Here are six ways to keep your identity safe and avoid 'phishing fraud'
In 2008, the U.S. Department of Defense suffered a significant compromise of its classified military computer networks. This previously classified incident was the most significant breach of U.S. military computers ever, and it served as an important wake-up call. The Pentagon's operation to counter the attack, known as Operation Buckshot Yankee, marked a turning point in cyberdefense strategy
Developers unite software and hardware-based security to reinforce laptop, web site defenses
Structured Query Language is one of the most popular ways hackers attack enterprises. Programmer and trainer Paul Litwin tells you how to identify weaknesses before hackers do
For the most part, shopping online is as safe as visiting your local mall. But every year, thousands of customers run into online scams. Researching companies in advance, even through a simple web search, can help people avoid such traps. Here are nine tips to keep you from being a victim
Apple products no longer get a pass when it comes to security. Here's how to ensure iPhone and iPad security in your company
The cloud's features we love most also leave our families vulnerable, but you can use the cloud without compromising your privacy.
James Lewis at the Center for Strategic and International Studies says cyberattacks are a cause for concern; expert Marcus Ranum argues that we should focus our security efforts elsewhere. Your feedback
Buried inside hundreds of pages of heavily redacted court documents from the case of a man accused of being one of al Qaeda's chief recruiters, is evidence that the terrorist group has launched successful cyberattacks, including one against government computers in Israel. This was the first public confirmation that the terrorist group has mounted an offensive cyberattack.
We have at least two opponents with the ability to launch damaging cyberattacks against the United States -- Russia and China. They have probably done the reconnaissance and planning necessary for these attacks, probing American networks for vulnerabilities. But they have not launched them. Why not?
Suddenly, the steady drumbeat of computer network security has been pushed to center stage, and now our government is talking about cyberwar and pointing a finger at China. Unless you've been asleep for a decade, you ought to be worried when our government starts using the rhetoric of warfare -- especially vocabulary like pre-emptive and deterrence. Why the sudden change?
The e-mail said it came from CareerBuilder and offered a job opportunity as a 'trading assistant.' Just one hitch: It wasn't an e-mail from CareerBuilder.com and it was not a job. It was part of a cynical scam that's becoming widespread. This scam is just part of an evolving cacophony of employment frauds that prey on the millions of Americans who are out of work.
The two-day 'Cyberdawn' exercise, one of the country's premier electronic war games. It is run with the help of volunteers by the private firm White Wolf Security, which also arranges closed war games for some federal agencies. The chance to test their cyberskills has attracted groups from private companies as well as the U.S. military
The Obama administration recognizes that the United States is utterly dependent on Internet-based systems and that its information assets are precariously exposed. Accordingly, it has made electronic network security a crucial defense priority. But that is only the tip of the iceberg.
The potential threats against
A level of vulnerability has been introduced into our way of life that is unprecedented. We now have a smaller connected globe where information can be moved in seconds, where information managed by computer networks -- which runs our utilities, our transportation, our banking and communications -- can be exploited or attacked in seconds from a remote location overseas