Latest articles for Network World

Danes targeted by malware spread through Dropbox

Danes targeted by malware spread through Dropbox

Earlier this week, Danish-speaking users were hit by malware spread through Dropbox, but the company responded quickly to shut down the attack. According to a…

dummy-img

Researchers link Middle East attacks to new victim in Europe

Kaspersky Labs announced new research this morning that shows some links between the massive Shamoon attack that took down 35,000 computers in Saudi Arabia to…

Security pros most worried about clouds, mobile

Security pros most worried about clouds, mobile

Companies were least prepared to assess the security risks of cloud and mobile technologies, according to a survey of cybersecurity professionals released this morning. Around…

AI is coming, and will take some jobs, but no need to worry

AI is coming, and will take some jobs, but no need to worry

The capabilities of artificial intelligence and machine learning are accelerating, and many cybersecurity tasks currently performed by humans will be automated. There will still be…

Scholars, infosec experts call for action on Russian hacking

Scholars, infosec experts call for action on Russian hacking

In the wake of reports about Russian involvement in fake news and hacks against political targets leading up to the recent presidential election, scholars and…

Report: Most cybercriminals earn $1,000 to $3,000 a month

Report: Most cybercriminals earn $1,000 to $3,000 a month

Most cybercriminals make between $1,000 and $3,000 a month, but 20 percent earn $20,000 a month or more, according to a recent report.The data is…

SIEMs-as-a-service addresses needs of small, midsize enterprises

SIEMs-as-a-service addresses needs of small, midsize enterprises

The city of Lewiston, in north central Idaho, has a population of around 32,000 and an information systems budget of around $800,000 a year.But it…

Report: Surveillance cameras most dangerous IoT devices in enterprise

Report: Surveillance cameras most dangerous IoT devices in enterprise

Networked security cameras are the most likely to have vulnerabilities when it comes to securing Internet of Things devices in the enterprise, according to a…

Visibility, security top concerns for cloud computing adoption

Visibility, security top concerns for cloud computing adoption

Enterprises considering adopting public clouds are concerned about where their data is located and how it’s protected, according to a new survey by IDG.Companies will…

AI makes security systems more flexible

AI makes security systems more flexible

Advances in machine learning are making security systems easier to train and more flexible in dealing with changing conditions, but not all use cases are…

Unencrypted pagers a security risk for hospitals, power plants

Unencrypted pagers a security risk for hospitals, power plants

For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages are sent…

Flash mobs the latest threat this holiday season

Flash mobs the latest threat this holiday season

The holiday season rings in more than just higher sales for retailers. There’s also more shoplifting and lower profit margins than the rest of the…

Russian criminals’ bank attacks go global

Russian criminals’ bank attacks go global

Russian cybercriminals have field tested their attack techniques on local banks, and have now begun taking them global, according to a new report — and…

Yahoo shows that breach impacts can go far beyond remediation expenses

Yahoo shows that breach impacts can go far beyond remediation expenses

Companies that focus on the immediate breach remediation costs may be missing the big picture, and could be under-investing in security as a result.Several studies…

Leaky IoT devices help hackers attack e-commerce sites

Leaky IoT devices help hackers attack e-commerce sites

Millions of IoT devices are misconfigured so that they can forward messages — which, combined with default admin settings, allows them to be used to…

How Shodan helped bring down a ransomware botnet

How Shodan helped bring down a ransomware botnet

Shodan is a search engine that looks for internet-connected devices. Hackers use it to find unsecured ports and companies use it to make sure that…

Data leaks evolving into weapons of business destruction

Data leaks evolving into weapons of business destruction

Most of the recent data breaches involve customer information such as user names and passwords, credit card numbers, and medical histories. The companies hacked are…

NY regulation aims to raise bank security standards

NY regulation aims to raise bank security standards

Next week, New York State will begin a 45-day public comment period on its new financial industry cybersecurity regulation — and, so far, security experts…

A single ransomware network has pulled in $121 million

A single ransomware network has pulled in $121 million

A single ransomware author and distributor was able to collect $121 million in ransomware payments during the first half of this year, netting $94 million…

Half of network management systems vulnerable to injection attacks

Half of network management systems vulnerable to injection attacks

Cross-site scripting and SQL injection attacks are well-known threats for public-facing Web applications, but internal systems can be attacked as well. For example, about half…

New tech can help catch spearphishing attacks

New tech can help catch spearphishing attacks

A CEO said that his controller had just received an email, ostensibly from him, asking her to process an urgent outgoing payment.Everything about the letter…

Deception technology grows and evolves

Deception technology grows and evolves

Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security analysts swamped with…

dummy-img

Experts challenge Skyhigh’s patent for cloud-based encryption gateway

Skyhigh  announced today that it has received a patent for its technology, which moves that encryption gateway into a hosted environment.Enterprises looking to protect sensitive…

Experts challenge Skyhigh’s patent for cloud-based encryption gateway

Experts challenge Skyhigh’s patent for cloud-based encryption gateway

Skyhigh  announced today that it has received a patent for its technology, which moves that encryption gateway into a hosted environment.Enterprises looking to protect sensitive…

Samsung both denies and admits mobile payment vulnerability

Samsung both denies and admits mobile payment vulnerability

Security researcher Salvador Mendoza demonstrated a flaw in Samsung Pay at Black Hat last week, in which the tokens used to secure transactions could be…

Insurers working to fill cyberinsurance data gaps

Insurers working to fill cyberinsurance data gaps

Insurance companies typically have decades of data, if not more, on which to base their risk estimates.That’s not the case with cyber risk, however. There’s…

Report: Only 3 percent of U.S. companies pay attackers after ransomware infections

Report: Only 3 percent of U.S. companies pay attackers after ransomware infections

Almost half of all companies have been the victims of a ransomware attack during the past 12 months, according to a new report. And while…

Health care organizations 114 times more likely to be ransomware victims than financial firms

Health care organizations 114 times more likely to be ransomware victims than financial firms

Health care organizations were 114 times more likely to hit by ransomware infections than financial firms, and 21 times more likely than educational institutions, according…

New HIPAA guidance addresses ransomware

New HIPAA guidance addresses ransomware

The U.S. Department of Human Services has released new guidance for health care organizations that focuses on the growing threat of ransomware, stresses the need…

Fake Olympic tickets and Zika news apps scam users

Fake Olympic tickets and Zika news apps scam users

These days not a headline goes by without some cybercriminal jumping all over it. Now, with the Olympics coming up and travelers wary of the…