Security issues have to be clearly examined before diving into software as a service (SaaS), warns Burton Group analyst Eric Maiwald, who shed some light on the subject at this week’s Infosec ...
Nothing gets people talking like a good story and in July 2008, headlines and blogs were abuzz with the news that Terry Childs, a network engineer in San Francisco's city-county government, was ...
Two Internet software developers who said they have uncovered a way to cause entire networks of computers to freeze or shut down may have simply rediscovered an old network issue. The network ...
A little more than a decade ago, three famous paintings were on display at the Whitworth Gallery, an art museum in Manchester, England. Since the works of Gauguin, Picasso, and Van Gogh were valued at ...
From nation-state actors to organized criminal networks, threat actors are constantly devising new techniques to compromise networks, steal sensitive data, and disrupt critical services. These attacks ...
You’ve just learned that a new worm from a former Soviet country is spreading fast because it doesn’t rely on e-mail – it automatically exploits a vulnerability in Microsoft’s Internet Information ...
Recently, a client reached out to us and asked how long an unsecured industrial control system (ICS) network, if connected to the Internet, would take to be attacked. Aside from generating some ...
Last fall, we invited readers to send in their network security questions to our panel of experts. Issues ranged from investigative tools to patch management to hardening networks. We selected half a ...
If you work at a large university, use Gmail or shop on Amazon, chances are you are being subjected to the same type of online monitoring as faculty members at the University of California, ...
A network security key is basically your Wi-Fi password — it's the encryption key that protects your internet. There are three different kinds of network security keys: WEP, WPA, and WPA2, each more ...