Latest articles for Network World

SIEMs-as-a-service addresses needs of small, midsize enterprises

The city of Lewiston, in north central Idaho, has a population of around 32,000 and an information systems budget of around $800,000 a year.But it…

Report: Surveillance cameras most dangerous IoT devices in enterprise

Networked security cameras are the most likely to have vulnerabilities when it comes to securing Internet of Things devices in the enterprise, according to a…

Visibility, security top concerns for cloud computing adoption

Enterprises considering adopting public clouds are concerned about where their data is located and how it’s protected, according to a new survey by IDG.Companies will…

AI makes security systems more flexible

Advances in machine learning are making security systems easier to train and more flexible in dealing with changing conditions, but not all use cases are…

Unencrypted pagers a security risk for hospitals, power plants

For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages are sent…

Flash mobs the latest threat this holiday season

The holiday season rings in more than just higher sales for retailers. There’s also more shoplifting and lower profit margins than the rest of the…

Russian criminals’ bank attacks go global

Russian cybercriminals have field tested their attack techniques on local banks, and have now begun taking them global, according to a new report — and…

Yahoo shows that breach impacts can go far beyond remediation expenses

Companies that focus on the immediate breach remediation costs may be missing the big picture, and could be under-investing in security as a result.Several studies…

Leaky IoT devices help hackers attack e-commerce sites

Millions of IoT devices are misconfigured so that they can forward messages — which, combined with default admin settings, allows them to be used to…

How Shodan helped bring down a ransomware botnet

Shodan is a search engine that looks for internet-connected devices. Hackers use it to find unsecured ports and companies use it to make sure that…

Data leaks evolving into weapons of business destruction

Most of the recent data breaches involve customer information such as user names and passwords, credit card numbers, and medical histories. The companies hacked are…

NY regulation aims to raise bank security standards

Next week, New York State will begin a 45-day public comment period on its new financial industry cybersecurity regulation — and, so far, security experts…

A single ransomware network has pulled in $121 million

A single ransomware author and distributor was able to collect $121 million in ransomware payments during the first half of this year, netting $94 million…

Half of network management systems vulnerable to injection attacks

Cross-site scripting and SQL injection attacks are well-known threats for public-facing Web applications, but internal systems can be attacked as well. For example, about half…

New tech can help catch spearphishing attacks

A CEO said that his controller had just received an email, ostensibly from him, asking her to process an urgent outgoing payment.Everything about the letter…

Deception technology grows and evolves

Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security analysts swamped with…

Experts challenge Skyhigh’s patent for cloud-based encryption gateway

Skyhigh announced today that it has received a patent for its technology, which moves that encryption gateway into a hosted environment.Enterprises looking to protect sensitive data…

Experts challenge Skyhigh’s patent for cloud-based encryption gateway

Skyhigh announced today that it has received a patent for its technology, which moves that encryption gateway into a hosted environment.Enterprises looking to protect sensitive data…

Samsung both denies and admits mobile payment vulnerability

Security researcher Salvador Mendoza demonstrated a flaw in Samsung Pay at Black Hat last week, in which the tokens used to secure transactions could be…

Insurers working to fill cyberinsurance data gaps

Insurance companies typically have decades of data, if not more, on which to base their risk estimates.That’s not the case with cyber risk, however. There’s…

Report: Only 3 percent of U.S. companies pay attackers after ransomware infections

Almost half of all companies have been the victims of a ransomware attack during the past 12 months, according to a new report. And while…

Health care organizations 114 times more likely to be ransomware victims than financial firms

Health care organizations were 114 times more likely to hit by ransomware infections than financial firms, and 21 times more likely than educational institutions, according…

New HIPAA guidance addresses ransomware

The U.S. Department of Human Services has released new guidance for health care organizations that focuses on the growing threat of ransomware, stresses the need…

Fake Olympic tickets and Zika news apps scam users

These days not a headline goes by without some cybercriminal jumping all over it. Now, with the Olympics coming up and travelers wary of the…

Rio Olympics pose security risks to travelers

Police officers held up a sign saying “Welcome to Hell” at the Rio airport last week, according to local and international news reports, and the…

Dangerous keyboard app has more than 50 million downloads

The Flash Keyboard app has been downloaded more than 50 million times — but is capable of some extremely dangerous behaviors.”It looked like it was…

BYOD can pose privacy risks to employees

Companies that use remote device management software to oversee employee devices used for business have the ability to collect a lot more information than employees…

Spearphishing attacks target boards

With great power comes great responsibility — and also a great big target painted on your head. At least, that’s the case lately with corporate…

Study: Most companies can’t protect confidential documents

A majority of companies don’t have the technology in place to keep employees from sharing confidential documents, according to a study released today.In particular, only…

Many smartphones still left unpatched

Shaming carriers and smartphone manufacturers into applying patches faster is a step forward, but a lot more needs to be done to improve security of…