Similar Articles |
|
InternetNews April 8, 2010 |
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official. |
InternetNews December 16, 2010 |
760,000 Exposed in Ohio State Breach A massive data breach at Ohio State University has current and former students and staff scrambling to check their credit reports. |
InternetNews March 25, 2010 |
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. |
InternetNews February 24, 2010 |
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. |
InternetNews June 8, 2010 |
HP System to Help Air Force Fight Cyber Threats HP's won a contract for a Cyber Control System that will help the Air Force gather strategic information and identify cyber threats. |
InternetNews February 9, 2010 |
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. |
InternetNews May 13, 2010 |
One Gang Responsible For Most Phishing Attacks More than two-thirds of all phishing attacks in the second half of 2009 were the work of one gang, according to an anti-phishing group. |
InternetNews February 23, 2010 |
Georgia University Stung By Data Breach More than 170,000 students and faculty members are checking their credit reports this week after a hacker broken into a server at Valdosta State University in Georgia. |
InternetNews August 3, 2010 |
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. |
InternetNews January 15, 2010 David Needle |
VeriSign Ties Google Attack to China Government Security firm cite sources claiming hackers acted on official authority from Chinese government. |
InternetNews February 4, 2010 |
Firewall Mishap Puts Iowa Workers' Data at Risk More than 80,000 people affiliated with the Hawkeye State's casino and racing industry were victimized by a cyber attack that most likely originated in China. |
InternetNews October 27, 2010 |
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. |
InternetNews August 27, 2010 |
Researcher Warns of New 64-Bit Windows Rootkit Security research firm Prevx warns that a new iteration of a familiar rootkit, TDL3, is now in the wild and threatens to compromise 64-bit Windows systems. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
InternetNews February 25, 2010 |
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. |
InternetNews January 12, 2010 |
Google Threatens to Close China Operations Google may abandon China if the government doesn't allow it to operate an unfiltered search engine. |
InternetNews February 5, 2010 |
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. |
InternetNews January 27, 2010 |
Cyber Terrorists Target U.S. Oil Industry Three of the world's largest U.S.-based oil and natural gas companies were hoodwinked by an extremely sophisticated malware attack designed to steal key proprietary data related to the whereabouts of new oil reserves. |
Bank Technology News April 2001 Maria Bruno |
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... |
Fast Company Michael Grothaus |
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
InternetNews April 20, 2010 |
Google Details Censorship Policies YouTube, Google Docs and other Web services, including its core search engine, have all been subject to censorship in different parts of the world. |
InternetNews May 13, 2010 |
APWG Fingers 'Avalanche' Phishing Syndicate The Anti-Phishing Working Group says one highly sophisticated and well-organized group of cyber thieves was responsible for a huge spike in phishing attacks late last year. |
InternetNews December 13, 2010 |
Data Breach Exposes Wisconsin Students' Data The University of Wisconsin became the latest U.S. college to endure a major data breach this year, putting the personal information of 60,000-plus former students and staff members at risk. |
InternetNews April 23, 2010 |
SMBs Often a Weak Link in Cyber Security Lax data security and a lack of resources could be exposing small and midsized businesses - and their customers - to risk. |
InternetNews March 30, 2010 |
IBM to Help Defend FAA From Cyber Attacks IBM will test a new system to monitor and safeguard the FAA's networks against hackers, data theft and malware. |
InternetNews May 20, 2010 |
South America Emerges As Cybercrime Hotspot China gets all the bad press but it turns out that Luxembourg, the Cayman Islands and a bunch of South American countries are actually the least discriminating when it comes to filtering malware. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
InternetNews March 31, 2010 |
Vietnamese Activists Hit With Malware: Google As it continues to spar with the Chinese government over Internet censorship, Google warns of an apparently unconnected attack in the region targeting Vietnamese activists. |
InternetNews November 16, 2006 Sean Michael Kerner |
Automated Patching Helping Zero-Day Exploits Latest SANS Institute top 20 list puts IE and Office squarely in hackers cross hairs. Are efforts to protect them fueling the rise? |
Technology Research News August 10, 2005 Kimberly Patch |
Plug-in Protects Passwords Researchers have created a browser plug-in, dubbed PwdHash, that produces a different password for each website you visit without requiring the you to remember more than a single password. |
InternetNews January 15, 2009 Richard Adhikari |
Hackers to Take Aim at the Cloud, Virtualization Malware authors and hackers are looking to take advantage of the newest developments in enterprise technology. |
InternetNews November 3, 2006 Ed Sutherland |
FBI: Twilight For Bank Phishermen U.S. and Poland hackers had targeted a major financial institution. |
InternetNews November 29, 2007 |
World Faces 'Cyber Cold War' Threat Cybercrime is no longer just a threat to industry and individuals but increasingly to national security. |
InternetNews March 12, 2010 |
Hackers Strike Popular Los Angeles Hotel The Westin Bonaventure Hotel & Suites gets targeted by criminals who may have gained access to travelers' credit cards. |
Fast Company Daniel Terdiman |
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. |
InternetNews October 6, 2006 Roy Mark |
Hackers Target Commerce Dept. Computers Chinese hackers are deviling the U.S. Department of Commerce, forcing the agency to replace workstations and bar employee use of the Internet from their own work computers. |
InternetNews June 4, 2010 |
Hackers Zero In On Execs With World Cup Scam A flurry of malware scams are using e-mails related to the upcoming World Cup to target executives at companies and organizations around the world. |
InternetNews December 28, 2010 |
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. |
The Motley Fool March 1, 2011 Gary Cassady |
More Hacking From Inside China, Trading Opportunities Is there a way to profit off of the misfortune of cyberattacks? |
Registered Rep. May 24, 2011 Lauren Barack |
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. |
Commercial Investment Real Estate Sep/Oct 2015 Alan Lyons |
Cyber Scares Protect your real estate business from online security breaches. |
InternetNews March 30, 2010 |
Microsoft Says IE's Defenses Not Unbeatable Microsoft touts 'defense in depth' as an effective deterrent after a white hat hacker last week demonstrated a complete takeover of Windows 7 running Internet Explorer 8. |
Bank Systems & Technology September 15, 2007 Sharon Gaudin |
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. |
InternetNews March 3, 2010 |
Mariposa Hackers Busted in Giant Botnet Scam Three Spanish hackers believed to be responsible for using a botnet to steal log-in credentials and customer banking data were arrested following a multinational investigation. |
InternetNews October 28, 2009 |
McAfee: SMBs Can't Afford to Ignore Cyber Threats Security software vendor says small- and midsized companies are becoming a popular target for hackers and online thieves. |
InternetNews April 14, 2004 Wagner & Naraine |
Stanford's Linux Supercomputers Compromised A sophisticated password sniffing program called 'John the Ripper' is behind the attacks, but officials don't see coordinated effort. |
InternetNews January 14, 2010 |
McAfee Fingers Microsoft IE Flaw in Google Attack McAfee's researchers say 'Operation Aurora' used a zero-day vulnerability in Microsoft's browser software to penetrate Google's networks. |
InternetNews May 10, 2005 Tim Gray |
Teen Held For Allegedly Swiping Code Reports say stolen Cisco source code was used to infiltrate military computers. |
PC Magazine April 5, 2006 Robert Lemos |
This Man Has a Virus Security software can do little about the most dangerous delivery mechanism of all: the user. |