Latest articles for Network World

Neiman Marcus case a reminder to check your cyber coverage

In a decision that should send major corporations to double-check their cyberinsurance, a federal appeals court ruled Monday that retail customers could go ahead and…

Neiman Marcus case a reminder to check your cyber coverage

In a decision that should send major corporations to double-check their cyberinsurance, a federal appeals court ruled Monday that retail customers could go ahead and…

Google Drive phishing is back — with obfuscation

If you have a Google account and a stranger sends you a link to a document on Google Drive, think twice before clicking — it…

All smartwatches have security flaws

In a recent security assessment of ten smartwatches and their iOS and Android companion applications, every single watch had at least one significant security flaw,…

InfoSec pros spend most time, money on self-inflicted problems

According to a new survey of Black Hat attendees released last week, InfoSec professionals are spending the biggest amount of their time and budgets on…

EFF celebrates 25 years of defending online privacy

The Electronic Frontier Foundation is the digital world’s top watchdog when it comes to privacy and free expression.But while cops and firefighters are often ready…

Regulators seek to limit security software exports

The comment period on a proposed set of software export restrictions ends next Monday, and the rules, as written, would severely restrict international sales, deployment,…

‘Morpho’ group goes after corporate IP

Symantec has identified a group of cybercriminals, whom they’ve named “Morpho,” as targeting corporate intellectual property for financial gains, with Twitter, Facebook, Apple and Microsoft…

Despite warnings, majority of firms still run some Windows Server 2003

Enterprises are still heavily dependent on Windows Server 2003 even though there were plenty of warnings that support is coming to an end on July…

IEEE group recommends random MAC addresses for Wi-Fi security

According to new recommendations by an IEEE study group, the Wi-Fi protocol needs to be updated to use randomly generated addresses for better security and…

Who’s winning the mobile payments war?

Mobile payments – using your phone instead of a credit card to make purchases at retail locations – has not taken off. Yet.To read this…

Macros big again with cybercriminals

Up to a year ago, most phishing emails were all about tricking users into clicking on malicious links that led to malware downloads. Starting last…

Cyber-extortionists are liars

The good news about cyber criminals who go in for extortion is that they also tend to be liars. The bad news — they’re extremely…

Banks get attacked four times more than other industries

Modern-day criminals are still following Willie Sutton’s example of going after banks “because there’s where the money is.”According to a new report from Websense Security…

Mobile security: the coming battle of hardware versus software

I’m starting to see signs for Apple Pay and Google Wallet everywhere I go. Google just announced its Android Pay platform and deals with AT&T,…

4 reasons why virtual reality isn’t real yet

UK-based virtual worlds research firm KZero projects that 83 million head-mounted virtual reality display headsets will have been sold by 2018, with a consumer market…

Virtual reality gains a small foothold in the enterprise

The rapid growth of the mobile sector has had an unexpected dividend — by bringing down the costs and improving the quality of motion sensors,…

Microsoft, Cisco, Avaya hone their virtual reality strategies

The leading unified communications (UC) vendors are taking a hard look at the opportunities for virtual reality in the conference room or the boardroom. For…

Open source pitfalls — and how to avoid them

It’s hard to imagine a company these days that isn’t using open source software somewhere, whether it’s Linux running a company’s print and web servers,…

10 big myths about Big Data

Big Data has dominated tech news of late. It has been touted as a possible solution for everything from intrusion detection to fraud prevention to…

Ubuntu 13.10: The good, the bad and the ugly

New Touch operating system for mobile devices is still a work in progress The newest release of Ubuntu, dubbed Saucy Salamander, doesn’t offer much in…

Don’t click on these links

Whether you receive a phishing email inviting you to click on a specific link, whether you see the link on your trusted social media sites,…

How to stay one step ahead of phishing attacks

Phishers are upping their game, so end users need to respond accordingly Protecting yourself against phishing attacks used to be relatively easy. Don’t download unexpected…

Is open source encryption the answer to NSA snooping?

When Unisys CISO John Frymier came in to work on Friday, Sept. 6, the phones were ringing, and continued to ring all day. Customers were…

10 reasons to take a Chromebook on the road

10 reasons to take a Chromebook on the road

If you’re trying to decide which device to buy for your next trip because your current laptop is too old, too slow, too heavy and…

10 encryption tips for the enterprise

Whether you’re protecting corporate data from internal leakers, hackers looking to steal money from you and your customers, foreign spies, your own government, or employees…

Fedora adds 3D printing support

Latest version of open source desktop boast several key improvements, but many usability issues remain The latest version of Fedora, nicknamed “Schrodinger’s Cat,” features a…

15 most powerful Big Data companies

The world of big data vendors is divided into two camps. There are the pure-play Big Data startups who are bringing innovation and buzz to…

Telecommuting from paradise

Nine years ago, Francie Tanner was working at a technology consulting company in Dallas. Today, she lives in Anguilla with her family and works as…

Telecommuting from paradise

Nine years ago, Francie Tanner was working at a technology consulting company in Dallas. Today, she lives in Anguilla with her family and works as…