Similar Articles |
|
InternetNews January 14, 2009 Richard Adhikari |
New York Plans Application Security Program Developers must straighten up and fly right if they want to do business with the Empire State. |
InternetNews February 18, 2010 |
SANS Names Mistakes That Cause Vulnerability If programmers were perfect, there would be no vulnerabilities for the bad guys to exploit. SANS Institute has listed the most common mistakes leading to the most common exploits. |
InternetNews February 9, 2010 |
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. |
InternetNews July 31, 2006 Clint Boulton |
SQL Injection Threatens to Needle Web Users A scripting flaw that lets perpetrators pull any content from a database is a scary tool for IT admins. |
InternetNews February 26, 2009 Richard Adhikari |
Experts Push Guidelines to Halt Data Breaches After a series of high-profile attacks and security lapses, government and private sector experts pull together a list of recommendations. |
InternetNews February 20, 2009 Richard Adhikari |
Group Warns of Top Web 2.0 Security Threats We can't stand in the path of progress with Web 2.0 technologies, but we can make it safer, an industry group says. |
Bank Technology News November 2007 |
Developers Face Secure Coding Exams The Secure Programming Council is a 40-organization board that's establishing "essential skills" standards and exams in a variety of programming languages. |
InternetNews February 5, 2010 |
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. |
InternetNews May 1, 2006 David Miller |
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. |
InternetNews October 11, 2004 Ryan Naraine |
Web Servers, BIND Top 2004 Vulnerabilities List The SANS institute breaks down the top 10 vulnerabilities in Windows and Unix systems. |
InternetNews July 25, 2005 Sean Michael Kerner |
SANS: No Safety From Vulnerabilities IE vulnerabilities still abound, but Apple, Mozilla and Real Player users have little to gloat about. |
InternetNews May 22, 2006 Ed Sutherland |
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems. |
InternetNews August 18, 2009 |
U.S. Fingers TJX Hacker in Heartland Breach Attacks on Heartland, 7-Eleven and Hannaford Bros. netted the criminals 130 million credit card numbers, according to the DoJ. |
InternetNews November 22, 2005 Sean Michael Kerner |
Hackers Change Course A new SANS 2005 Top 20 list of Internet vulnerabilities shows a shift in what attackers are going after. And it's not just operating systems anymore. |
InternetNews October 28, 2009 |
McAfee: SMBs Can't Afford to Ignore Cyber Threats Security software vendor says small- and midsized companies are becoming a popular target for hackers and online thieves. |
InternetNews November 17, 2009 |
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. |
InternetNews April 8, 2009 Alex Goldman |
Pentagon Claims $100M in Cybersecurity Costs The threat is real, but so is the fight for budget financing in Washington. |
National Defense August 2014 Stew Magnuson |
Cyber Labor Shortage Not What it Seems, Experts Say Only a handful of universities offering cyber security degrees are producing graduates who have "hard skills." |
InternetNews December 8, 2008 Richard Adhikari |
Obama Faces New Calls for Cybersecurity Revamp National security think tank pushes for new U.S. oversight and regulations to combat Internet threats. |
The Motley Fool October 11, 2005 |
Fixing Your Credit Report Errors Here's how -- and why! -- you should correct your credit report. |
Popular Mechanics June 30, 2008 Glenn Derene |
Inside NSA Red Team Secret Ops With Government's Top Hackers Highly skilled firewall-crackers help the government keep the bad guys out of the country's computer systems. |
The Motley Fool July 1, 2004 |
Fix Your Credit Report Errors You can -- and should! -- make sure your credit report is accurate. |
CIO June 26, 2009 Kim S. Nash |
Obama's Cybersecurity Push: What It Means for CIOs President Obama aims to fix U.S. cybersecurity, but can the feds hit a moving target? Not without private sector support and practical solutions. |
Bank Technology News May 1, 2008 Rebecca Sausner |
Homeland Security: Manhattan Project for Cyber Sec The federal government has begun to offer details on an expensive, and targeted, defensive cyber-security plan to protect our nation's financial markets. |
InternetNews September 8, 2006 Roy Mark |
Five Years Later, Are We More Secure? We may be more secure in some ways since 9/11, but network security isn't one of them. |
National Defense May 2014 Stew Magnuson |
New Cyber Hygiene Campaign Seeks to Curtail Attacks The Center for Internet Security and the Council on CyberSecurity, working with the Department of Homeland Security, the National Governors Association and the Governors Homeland Security Advisors Council launched the Cyber Hygiene Campaign in April. |
InternetNews December 1, 2005 Sean Michael Kerner |
Backup Software Under Attack A SANS report on top security vulnerabilities finds that backup and recovery software has become a favorite target of hackers. |
InternetNews February 10, 2009 Kenneth Corbin |
Obama Calls for Cybersecurity Review After a string of breaches and data leaks, president orders two-month interagency review to shore up computing infrastructure. |
InternetNews April 23, 2010 |
SMBs Often a Weak Link in Cyber Security Lax data security and a lack of resources could be exposing small and midsized businesses - and their customers - to risk. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
InternetNews May 28, 2009 Kenneth Corbin |
Counting Down to White House Cyber Czar As the time draws near, many questions remain about how Obama will shake up government cybersecurity. |
National Defense October 2015 Tim Larkins |
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. |
National Defense March 2015 Sarah Sicard |
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. |
InternetNews July 8, 2009 Alex Goldman |
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. |
PC World March 2006 Andrew Sullivan |
Programs in Peril Popular applications have more security flaws than Windows does. |
InternetNews February 18, 2009 Sean Michael Kerner |
Black Hat: U.S. Needs 'Cyberweapons' for Security An expert asks whether it's time for the U.S. to take aggressive measures to rein in national network security. |
Insurance & Technology November 5, 2008 Prasad Balakrishnan |
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up. |
InternetNews August 3, 2010 |
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. |
InternetNews April 17, 2006 Tim Scannell |
Cyber Sleuths Call For New 'Smart Swarms' Security honchos say new threats from cyber-terrorism require a fresh approach to network protection, like 'smart swarming.' |
InternetNews February 24, 2010 |
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. |
The Motley Fool July 13, 2009 Rich Smith |
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. |
InternetNews December 13, 2005 Roy Mark |
Cyber Security Group Flunks Washington Neither the Bush administration nor Congress is providing significant leadership or legislation to secure the United States against cyber attacks, the Cyber Security Industry Alliance charged Tuesday. |
InternetNews November 29, 2007 Andy Patrizio |
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. |
InternetNews April 16, 2009 Alex Goldman |
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. |
National Defense January 2016 Stephanie Meloni |
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. |
InternetNews December 5, 2008 Richard Adhikari |
Cyber Threats Await Next Homeland Security Chief How might Obama's appointment to head the DHS turn things around for the department? Experts weigh in. |
InternetNews December 7, 2004 Roy Mark |
Execs Call for Tighter Cyber Security Control Security alliance claims White House and DHS are not doing enough to protect against cyber attacks. |
CIO September 28, 2014 George V. Hulme |
Data Breaches Rise as Cybercriminals Continue to Outwit IT Security breaches rise again this year, costing an average of $415,000, as security pros fail to keep pace with cybercrime innovation. |
InternetNews April 10, 2008 Susan Kuchinskas |
An Imperfect (Cyber) Storm The federal government has been working with private companies and security vendors to develop protocols and communications systems that will let them respond quickly and share relevant information on threats and attacks. |
Popular Mechanics April 21, 2009 Glenn Derene |
Obama Set to Provide a New Direction for Cyber Security in U.S. In light of shocking security lapses, Obama will soon announce a new direction for the United States to combat cyber threats. |