Maintaining robust network defenses requires a proactive approach to keep pace with today's rapidly evolving network security threats. One crucial element of an effective network security strategy is penetration testing, or staged attacks in network ...
I've long been a believer that a judgement gap, influenced largely by negative media coverage, is what continues to hold back cloud adoption among small organizations. And judging from the results of a recent study completed by comScore, my intuition has been fairly on track.
File storage and sharing using consumer-oriented cloud services can be a security problem for companies that want to avoid sensitive data leaks. ownCloud aims to solve the issue by offering commercial cloud services installed within a company's own datacenter.
Buried in a 100-page report issued last week by the Commission on the Theft of American Intellectual Property was a recommendation to copy a tactic cyber scammers use to extort money from innocent victims.
Google has been using its own custom version of Linux, Google Compute Engine Linux, as it loads its customers' applications into its infrastructure as a service.
A tiff between a Dutch company and Spamhaus, which blacklists spammers, has turned into a cyber attack of epic proportions.
The distributed denial of service attack (DDoS) spread from the Spamhaus website to the rest of the Internet, reportedly affecting millions of rank and file Internet users.
'm going to start with three data points.
One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. government and corporations were identified because they accessed Facebook from the same network infrastructure they used to carry out their attacks.
It's 2013. but the Linux FUD just keeps coming. In the most recent example, security firm Trustwave claimed that Linux kernel vulnerabilities went unpatched more than twice as long as it took to fix unpatched flaws in Windows. This assertion would be a lot more believable if it wasn't coming from a Microsoft partner.
Secure Sockets Layer/Transport Layer Security is the foundational technology that secures Web transactions and communications, but it is not infallible.
Printers using server software offered by Hewlett-Packard (HP) are reportedly vulnerable to attack. In fact, it's possible for a hacker to use the flaw to bypass security defenses, steal documents, and crash every machine connected to the same network.
The Security for Business Innovation Council, comprised of IT security professionals from 19 companies worldwide, called cloud computing the main disruptive force for 2013.
A fool and his feeble p@$$w0rd are soon rooted, but if 2012 has proven anything, it's that even the most cautious security-minded souls need to double down on their protective practices, and think about the best ways to mitigate damage if the worst happens in our increasingly cloud-connected world.
Because Web 1.0 is many years behind us, we can all look back and laugh at the sorry state of application and database security in those days. When we look back at Cloud 1.0 in a few more years, we're sure to have another good chuckle.
A whole range of Arcor, Asus and TP-Link routers are vulnerable to being reconfigured remotely without authorisation. On his blog, security researcher Bogdan Calin demonstrates that just displaying an email within the router's own network can have far-reaching consequences: when opened, his specially crafted test email reconfigures the wireless router so that it redirects the user's internet data traffic.
Any enterprise looking to use cloud computing services will also be digging into what laws and regulations might hold in terms of security and privacy of data stored in the cloud. At the Cloud Security Alliance Congress in Orlando this week, discussion centered on two important regulatory frameworks now being put in place in Europe and the U.S.
Not computer networks, networks in general:
Findings so far suggest that networks of networks pose risks of catastrophic danger that can exceed the risks in isolated systems. A seemingly benign disruption can generate rippling negative effects.
When it comes to security, most mobile devices are a target waiting to be attacked. That's pretty much the conclusion of a report to Congress on the status of the security of mobile devices this week by watchdogs at the Government Accountability Office.
While Steve Wozniak's main concern is with cloud user agreements, there are security issues as well. Wired reporter Mat Honan reported that his iCloud account had been hacked on Friday, and that the intruder had remotely wiped the shared content on all of his devices -- including MacBook Air, iPhone and iPad.