Similar Articles |
|
InternetNews February 5, 2010 |
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. |
InternetNews January 21, 2010 |
Microsoft Serves Up Zero-Day Fix for IE Flaw Microsoft issued a cumulative update for most Internet Explorer versions in order to shore up a gaping security hole that left Google and dozens of other companies open to attack from Chinese hackers. |
CIO April 15, 2004 Eric Knorr |
Guard the Application Layer Firewalls alone are no longer enough to protect your online assets |
InternetNews March 25, 2008 Sean Michael Kerner |
Report: 90% of Web Sites Vulnerable to Hackers New study claims Cross-Site Scripting attacks are all over the place. Should we be afraid? |
InternetNews July 31, 2006 Clint Boulton |
SQL Injection Threatens to Needle Web Users A scripting flaw that lets perpetrators pull any content from a database is a scary tool for IT admins. |
InternetNews December 23, 2008 Sean Michael Kerner |
New Zero-Day Exploit Emerges for Microsoft SQL Microsoft issues warning for attack vector that could paralyze database servers. |
InternetNews October 17, 2008 Richard Adhikari |
Adobe Sites Hit by Malware Just weeks after a BusinessWeek Web site was hit by an SQL injection attack, comes news that Adobe has had to deal with two of its Web sites compromised the same way. |
InternetNews April 2, 2007 Michael Hickins |
Game On: Microsoft to Issue Emergency Patch Microsoft is issuing the patch in advance of its usual Patch Tuesday schedule to counter role-play game hackers. |
Bank Technology News September 2009 Rebecca Sausner |
Everything That Can Go Wrong The aftermath of the breach of Albert Gonzalez has had some positive effects. |
InternetNews December 16, 2008 Sean Michael Kerner |
'Shockers' in Cisco's Year-End Security Report But it's what didn't make it into the report that could be even more revealing. |
InternetNews April 16, 2009 Alex Goldman |
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. |
InternetNews November 16, 2006 Sean Michael Kerner |
Automated Patching Helping Zero-Day Exploits Latest SANS Institute top 20 list puts IE and Office squarely in hackers cross hairs. Are efforts to protect them fueling the rise? |
PC World February 3, 2003 Paul Roberts |
The Net Is Dangerous, Research Says Attack rates decline, but worms and software flaws keep cyberspace hazardous, Symantec reports. |
InternetNews February 9, 2010 |
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. |
InternetNews September 15, 2008 Richard Adhikari |
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. |
PC Magazine May 1, 2010 Albanesius & Rhey |
Anatomy of a Hack In late March, a chapter was closed with little fanfare on the biggest case of online identity theft in U.S. history. |
InternetNews August 18, 2009 |
U.S. Fingers TJX Hacker in Heartland Breach Attacks on Heartland, 7-Eleven and Hannaford Bros. netted the criminals 130 million credit card numbers, according to the DoJ. |
InternetNews July 8, 2009 Alex Goldman |
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. |
CIO January 1, 2002 Sarah D. Scalet |
How to Not Recover from Getting Hacked (A Loser's Guide to Failure) A guide for what not to do when you get hacked. Take a moment to learn from the mistakes that others have made. |
InternetNews February 20, 2009 Richard Adhikari |
Group Warns of Top Web 2.0 Security Threats We can't stand in the path of progress with Web 2.0 technologies, but we can make it safer, an industry group says. |
InternetNews March 11, 2008 David Needle |
Microsoft Targets Office Remote Execution Flaws Latest "Patch Tuesday" updates aim to shut the door on a slew of critical Office suite vulnerabilities. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
Chemistry World June 10, 2015 Emma Stoye |
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. |
InternetNews January 19, 2010 |
Microsoft to Ship 'Out-of-Band' Patch New zero-day hole aided hackers in Google attacks and required immediate action. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
InternetNews June 11, 2009 Alex Goldman |
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
InternetNews May 1, 2006 David Miller |
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. |
InternetNews February 9, 2007 Clint Boulton |
RSA Reminds Us to Fight The Good Fight There is no bullet-proof way to outmaneuver people who want your data. But we need to try. |
InternetNews February 2, 2009 Richard Adhikari |
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. |
National Defense August 2012 Eric Beidel |
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. |
New Architect May 2002 Jay Lyman |
to Catch a Thief Effective incident response against network intruders... |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
InternetNews December 10, 2009 |
Fast-Moving SQL Attack Hits 125,000-Plus Sites Nasty SQL injection attack has ties to a credit card-snatching trojan - and may just be getting started. |
InternetNews March 16, 2004 Ryan Naraine |
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. |
Registered Rep. May 24, 2011 Lauren Barack |
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. |
InternetNews June 28, 2005 Tim Gray |
UConn Finds Hacking Program in Server University of Connecticut officials say a server containing the personal data of many of its staff and students was compromised on at least one occasion. |
T.H.E. Journal February 2009 John K. Waters |
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? |
Bank Technology News September 2008 Tom Kellermann |
The Cyber Security Quagmire It's becoming essential that on a quarterly basis financial institutions conduct penetration tests on service providers. These tests should assess their network security posture, and verify whether they have layered security beyond firewalls, virus scanners and encryption. |
Entrepreneur June 2010 Ericka Chickowski |
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. |
Defense Update Issue 3, 2005 |
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. |
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
PC World May 23, 2001 Frank Thorsberg |
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... |
Search Engine Watch April 14, 2011 Kristine Schachinger |
3 Website Exploits - Are You Protected? Examining three common attacks that can hurt your visitors and rankings, and tips on how to prevent your site from being hacked. |
InternetNews June 16, 2011 |
Mesh Injection Attack Claims 30,000 Sites Meshed Web attack emerges that takes a new approach to replication and it may already be a big problem. |
The Motley Fool June 13, 2011 Arunava De |
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. |
Bank Technology News April 2001 Maria Bruno |
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... |
InternetNews January 24, 2006 Sean Michael Kerner |
IBM: Users Are The Weak Link in Security IBM is warning in a new report that, though widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006. The culprit? Highly targeted attacks that rely on naive users to help perpetrate cybercrimes. |
CIO August 29, 2011 Robert McMillan |
Five Things CIOs Need to Know about Anonymous The hacking collective dubbed Anonymous has unleashed its brand of pesky "operations" on companies from Visa to Sony. Here are the top five things you need to know about their antics. |