Similar Articles |
|
IEEE Spectrum January 2008 Mark Anderson |
What a Wi-Fi Worm Outbreak Would Look Like A future form of computer malware might infect Wi-Fi routers and steal data. |
InternetNews February 16, 2007 Ed Sutherland |
Symantec Sounds Warning on Router Passwords Symantec warns on a vulnerability in some home broadband routers. |
InternetNews August 27, 2009 |
First WEP, Now WPA Encryption Falls Japanese researchers to show how WPA can be broken as easily as WEP, in under a minute. |
InternetNews July 28, 2010 |
Enterprise Wi-Fi users at Risk? Although Cisco downplays the danger, researchers at the Black Hat security conference discussed a potential security vulnerability in Cisco 1200-series wireless access points. |
InternetNews November 23, 2009 |
Second iPhone Worm Targets Personal Data The second incident of espionage on jailbroken iPhones is much nastier than its prank-like predecessor. |
InternetNews November 7, 2008 Richard Adhikari |
Chinks Appear in WPA's Wireless Security Armor Researchers with the British Computer Society claim to have cracked the Wi-Fi Protected Access wireless security standard and will reveal their findings at the PacSec conference to be held in Tokyo next week. |
PC World April 2004 Scott Spanbauer |
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. |
InternetNews November 9, 2009 |
Worm Attack Rickrolls Aussie iPhones A virus that replaces wallpaper strikes on jailbroken iPhones Down Under. |
InternetNews March 3, 2009 Richard Adhikari |
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. |
PC Magazine September 12, 2007 John Brandon |
Beyond WEP: Beef Up Your Wi-Fi Security Wireless security is not just for experts anymore. |
InternetNews November 9, 2010 |
USB Devices Pose New Security Threats Portable drives and storage devices are a leading source of malware, according to one security software developer. |
InternetNews August 17, 2005 Tim Gray |
Windows Worm Goes Global The Zotob.B virus and its variants are now using chat channels to allow hackers to control infected PCs. |
InternetNews February 26, 2004 Sean Michael Kerner |
Worms Continue to Wriggle, Wreak Havoc 'Zero-day' exploits and new styles of viruses send security firms scrambling to patch the latest holes in the network. |
PC World August 2003 Yardena Arar |
Better 802.11 Security Wi-Fi networks get safer with downloadable firmware. |
InternetNews June 11, 2009 Alex Goldman |
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. |
InternetNews February 24, 2009 Richard Adhikari |
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies. |
InternetNews December 16, 2008 Richard Adhikari |
Several Attacks Behind CheckFree Data Breach The cybercriminals who breached the CheckFree bill paying service last week used a combination attack that may be almost impossible to stop. |
PC World December 2005 Stuart J. Johnston |
Windows Bug Allows Repeat Invasions Microsoft recently released a Security Advisory for a Firewall quirk... Avoid a fake Google site... A problem with Windows updates... Fix Wi-Fi router problems... |
PC World March 2006 Andrew Brandt |
Wireless Tips: Your Wireless Network Needs a Security Update Add new security features to your wireless gateway and improve Windows XP's Wi-Fi security. |
InternetNews October 31, 2005 Jim Wagner |
Alert Sounds Alarm From Within Security vendor Alert Logic has launched a hosted subscription service that protects enterprise networks from internal attacks. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
Wall Street & Technology January 5, 2005 David Tan |
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. |
InternetNews February 26, 2009 Richard Adhikari |
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. |
InternetNews April 20, 2004 Ryan Naraine |
Exploit for Windows SSL Flaw Circulating Unpatched systems are at risk of DoS attacks but security experts warn the threat level could grow considerably. |
InternetNews February 7, 2007 David Needle |
Notebook Users Under Attack at Security Conference AirDefense finds numerous incidents of wireless vulnerabilities at RSA show. |
InternetNews January 9, 2004 Sean Michael Kerner |
Fake Microsoft Service Pack is Xombe Trojan Another day, another virus. Unsuspecting Internet users were greeted Friday with an e-mail message purportedly from [email protected] to update their computers. Problem is, the message isn't from Microsoft and the patch is actually a back door Trojan. |
InternetNews March 17, 2006 Sean Michael Kerner |
Beware The Wardriver at Your Next Conference Security research firm scans an IT tech show and provides some interesting results on the security of Wi-Fi signals. |
InternetNews March 27, 2009 Alex Goldman |
Conficker Countdown: Experts Stress Caution Malware code has infected millions of PCs and will activate on April 1. What do security insiders say users need to know? |
Investment Advisor October 2010 Dan Skiles |
Four Security Best Practices That All Advisors Should Implement Common sense security will make your firm a tough target for hackers. |
InternetNews March 10, 2010 |
Mariposa Bot Shipped With Vodafone Smartphone Panda Security discovered Confiker, Mariposa and Lineage password stealing malware samples installed on a recently purchased Vodafone HTC Magic smartphone. |
InternetNews January 4, 2007 Ed Sutherland |
Vista Exploit Looking For Achilles' Heel First Vista exploit could mean lasting problems for Microsoft, according to a security vendor. |
InternetNews August 20, 2004 Ryan Naraine |
New Download.Ject Attack Hits IM Networks The Download.Ject malware attack has resurfaced, using the popular AIM and ICQ instant messaging networks to spread itself. |
InternetNews June 28, 2004 Ryan Naraine |
Malware Attack Thwarted but Danger Lurks Critical IE vulnerability remains unpatched. |
InternetNews August 18, 2010 |
Facebook Kit Makes Hacking Logins Easy Security software vendor BitDefender says it's found a new malware kit that lets hackers easily access logins and passwords for Facebook and other unsecured credentials. |
InternetNews September 27, 2010 |
Stuxnet Worm Infests Iranian Nuclear Plant The aggressive and decidedly crafty Stuxnet worm has struck Iran's first nuclear power facility, government officials said Monday. |
InternetNews October 29, 2008 Judy Mottl |
Wi-Fi Networks Growing in Number, Security Companies and consumers are using Wi-Fi networks more than ever, although security measures aren't always keeping pace, according to a new study. |
BusinessWeek September 9, 2009 Stephen H. Wildstrom |
Microsoft's Security Essentials Hits Back at Hackers The free new antivirus software is simple to install and operated without a hitch, an important step toward better computer security for Windows users. |
InternetNews July 8, 2009 Alex Goldman |
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. |
PC World June 13, 2002 Sam Costello |
First JPEG Virus Identified McAfee studies lab virus that could change the way digital infections spread -- and are contained. |
PC Magazine August 3, 2004 |
Keep Your PC Safe Learn to wield your firewall, antivirus, and antispyware tools expertly; don't give up your PC without a fight. |
PC Magazine September 21, 2004 |
NAT Enough? A home router is not a complete security solution. |
Defense Update Issue 3, 2005 |
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. |
InternetNews January 14, 2010 |
McAfee Fingers Microsoft IE Flaw in Google Attack McAfee's researchers say 'Operation Aurora' used a zero-day vulnerability in Microsoft's browser software to penetrate Google's networks. |
This Old House Eric Hagerman |
How to Hack-Proof Your Smart Home A senior security researcher at the risk management firm Tripwire gives his tips for protecting your router and Wi-Fi devices |
InternetNews July 28, 2004 Ryan Naraine |
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack. |
InternetNews July 6, 2006 Sean Michael Kerner |
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. |
PC Magazine March 16, 2009 Rist & Griffith |
Home Networking in 5 Easy Steps Building a new home network doesn't have to be tough if you follow our five easy steps. |
PC Magazine November 30, 2004 John C. Dvorak |
Wi-Fi Nightmares The biggest joke about 802.11 is that nobody uses any of the encryption schemes--except when they shouldn't. |
T.H.E. Journal December 2002 Vincent Weafer |
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. |
InternetNews November 20, 2009 |
Past Year's Malware Could Shape 2010's Threats Ever heard of Induc, Sninsfs or OSX.iservice? These new types of attacks emerged in 2009 and could become more prevalent in the year ahead. |