Latest articles for Network World

Experts challenge Skyhigh’s patent for cloud-based encryption gateway

Experts challenge Skyhigh’s patent for cloud-based encryption gateway

Skyhigh  announced today that it has received a patent for its technology, which moves that encryption gateway into a hosted environment.Enterprises looking to protect sensitive…

Samsung both denies and admits mobile payment vulnerability

Samsung both denies and admits mobile payment vulnerability

Security researcher Salvador Mendoza demonstrated a flaw in Samsung Pay at Black Hat last week, in which the tokens used to secure transactions could be…

Insurers working to fill cyberinsurance data gaps

Insurers working to fill cyberinsurance data gaps

Insurance companies typically have decades of data, if not more, on which to base their risk estimates.That’s not the case with cyber risk, however. There’s…

Report: Only 3 percent of U.S. companies pay attackers after ransomware infections

Report: Only 3 percent of U.S. companies pay attackers after ransomware infections

Almost half of all companies have been the victims of a ransomware attack during the past 12 months, according to a new report. And while…

Health care organizations 114 times more likely to be ransomware victims than financial firms

Health care organizations 114 times more likely to be ransomware victims than financial firms

Health care organizations were 114 times more likely to hit by ransomware infections than financial firms, and 21 times more likely than educational institutions, according…

New HIPAA guidance addresses ransomware

New HIPAA guidance addresses ransomware

The U.S. Department of Human Services has released new guidance for health care organizations that focuses on the growing threat of ransomware, stresses the need…

Fake Olympic tickets and Zika news apps scam users

Fake Olympic tickets and Zika news apps scam users

These days not a headline goes by without some cybercriminal jumping all over it. Now, with the Olympics coming up and travelers wary of the…

Rio Olympics pose security risks to travelers

Rio Olympics pose security risks to travelers

Police officers held up a sign saying “Welcome to Hell” at the Rio airport last week, according to local and international news reports, and the…

Dangerous keyboard app has more than 50 million downloads

Dangerous keyboard app has more than 50 million downloads

The Flash Keyboard app has been downloaded more than 50 million times — but is capable of some extremely dangerous behaviors.”It looked like it was…

BYOD can pose privacy risks to employees

BYOD can pose privacy risks to employees

Companies that use remote device management software to oversee employee devices used for business have the ability to collect a lot more information than employees…

Spearphishing attacks target boards

Spearphishing attacks target boards

With great power comes great responsibility — and also a great big target painted on your head. At least, that’s the case lately with corporate…

Study: Most companies can’t protect confidential documents

Study: Most companies can’t protect confidential documents

A majority of companies don’t have the technology in place to keep employees from sharing confidential documents, according to a study released today.In particular, only…

Many smartphones still left unpatched

Many smartphones still left unpatched

Shaming carriers and smartphone manufacturers into applying patches faster is a step forward, but a lot more needs to be done to improve security of…

93% of phishing emails are now ransomware

93% of phishing emails are now ransomware

As of the end of March, 93 percent of all phishing emails contained encryption ransomware, according to a report released today by PhishMe.That was up…

Will your backups protect you against ransomware?

Will your backups protect you against ransomware?

In theory, nobody should be paying any money to the ransomware extortionists. Doesn’t everyone have backups these days? Even consumer has access to a wide…

Laptop updaters riddled with security holes

Laptop updaters riddled with security holes

A recent test of pre-installed updater software on 10 laptops showed that every single one had security problems.”We went and bought about 10 laptops,” said…

Regulators: cybersecurity poses biggest risk to global financial system

Regulators: cybersecurity poses biggest risk to global financial system

Last week, the chair of the Securities and Exchange Commission called cybersecurity the biggest risk facing the global financial industry.”Cyber risks can produce far-reaching impacts,”…

Cybercriminal business model vulnerable to intervention

Cybercriminal business model vulnerable to intervention

Cybercrime may be booming but its business model is vulnerable on many fronts, according to a new report.”We’ve been observing that they’ve been acting like…

Terrorists opt for consumer tools

Terrorists opt for consumer tools

Although cybercriminals have been turning out specialized hacking and attack tools at a rapid pace, terrorists are often using legitimate, consumer-focused technologies, according to a…

10 companies that can help you fight phishing

10 companies that can help you fight phishing

According to the most recent Verizon data breach report, a phishing email is often the first phase of an attack. That’s because it works well,…

DDoS costs, damages on the rise

DDoS costs, damages on the rise

Peak-time distributed denial-of-service attacks cost organizations more than $100,000 per hour, said half of the respondents to a new survey of mid-sized and large corporations…

DDoS costs, damages on the rise

DDoS costs, damages on the rise

Peak-time distributed denial-of-service attacks cost organizations more than $100,000 per hour, said half of the respondents to a new survey of mid-sized and large corporations…

Enterprises fall behind on protecting against phishing, detecting breaches

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report came out this morning with bad news on multiple fronts, including click-through rates on phishing messages, how long…

CEO targeted by fraud twice a month

CEO targeted by fraud twice a month

Every couple of weeks or so, Tom Kemp’s company gets hit by ever-more-sophisticated attempts to trick them out of large sums of money.It started two…

Symantec: Zero-days doubled in 2015, more companies hiding breach data

Symantec: Zero-days doubled in 2015, more companies hiding breach data

Fifty-four zero-day vulnerabilities were discovered last year, according to a report released this morning by Symantec, more than double that of 2014, and the number…

Millions of child support records stolen, D.C. officials want answers

Millions of child support records stolen, D.C. officials want answers

In early February, a thief broke into several offices in Olympia, Washington to steal anything he could grab that was worth selling. In one locked…

Is the blockchain good for security?

Is the blockchain good for security?

Overstock was one of the first online retailers to adopt Bitcoin in a big way. Now it’s become the first major company to issue stock…

Feds tackle open source code quality

Feds tackle open source code quality

Even as the White House is calling on federal agencies to make more use of open source projects, there’s also a federal effort under way…

Merging firms appealing targets for attackers

Merging firms appealing targets for attackers

Companies going through a merger or acquisition, as well as their lawyers, financial advisers, and other associated firms are all tempting targets for cyberattackers, according…

How virtual reality could transform health care

How virtual reality could transform health care

For those who ordered early, the long-awaited Oculus Rift starts shipping today, the HTC Vive is expected to officially ship April 5, and Sony’s Playstation…