Latest articles for Network World

Court: FTC can take action on corporate data breaches

The US Court of Appeals has ruled that the FTC mandate to protect consumers against fraudulent, deceptive and unfair business practices extends to oversight of…

Study: 81% of large health care organizations breached

In the past two years, 81 percent of hospitals and health insurance companies have had a data breach, according to a report released by KPMG.”These…

Intel: Criminals getting better at data exfiltration

Enterprises tend to be highly focused on keeping attackers out of their systems, but most of the actual damage happens not when the bad guys…

The Web’s ten most dangerous neighborhoods

Wouldn’t it be convenient if all the spam and malware sites were all grouped together under one top-level domain — .evil, say — so that…

CSO burnout biggest factor in infosec talent shortage

The real cause of the talent shortage in the information security field isn’t a lack of new people entering the profession, but retention and churn…

Amazon dumps Flash, and the Web is better off

Amazon will stop accepting Flash ads on its advertising network on Tuesday, and it will help make the entire Web more secure, security experts say.…

Most corporate risk due to just 1% of employees

Just 1 percent of employees are responsible for 75 percent of cloud-related enterprise security risk, and companies can dramatically reduce their exposure at very little…

Tips for protecting your business against cyber extortion

CrytoLocker is malware cyber criminals use to encrypt the contents of a computer until users pay up.But that’s only one type of cyber extortion, according…

Review: Canonical continues cloud push with Ubuntu 15.04

According to the latest statistics from The Cloud Market, Ubuntu now accounts for 59% of all images on the Amazon EC2 platform. Windows has 8%,…

GameOver ZeuS criminals spied on Turkey, Georgia, Ukraine and OPEC

The criminals behind the GameOver ZeuS Botnet didn’t just steal $100 million from banks — they also spied on several countries on behalf of Russia,…

T-Mobile caught in crossfire of injected ad war with Flash Networks

LAS VEGAS – An ongoing conflict between website owners and ad injectors who place unwanted ads on those websites has just flared up into full-blown war,…

Neiman Marcus case a reminder to check your cyber coverage

In a decision that should send major corporations to double-check their cyberinsurance, a federal appeals court ruled Monday that retail customers could go ahead and…

Neiman Marcus case a reminder to check your cyber coverage

In a decision that should send major corporations to double-check their cyberinsurance, a federal appeals court ruled Monday that retail customers could go ahead and…

Google Drive phishing is back — with obfuscation

If you have a Google account and a stranger sends you a link to a document on Google Drive, think twice before clicking — it…

All smartwatches have security flaws

In a recent security assessment of ten smartwatches and their iOS and Android companion applications, every single watch had at least one significant security flaw,…

InfoSec pros spend most time, money on self-inflicted problems

According to a new survey of Black Hat attendees released last week, InfoSec professionals are spending the biggest amount of their time and budgets on…

EFF celebrates 25 years of defending online privacy

The Electronic Frontier Foundation is the digital world’s top watchdog when it comes to privacy and free expression.But while cops and firefighters are often ready…

Regulators seek to limit security software exports

The comment period on a proposed set of software export restrictions ends next Monday, and the rules, as written, would severely restrict international sales, deployment,…

‘Morpho’ group goes after corporate IP

Symantec has identified a group of cybercriminals, whom they’ve named “Morpho,” as targeting corporate intellectual property for financial gains, with Twitter, Facebook, Apple and Microsoft…

Despite warnings, majority of firms still run some Windows Server 2003

Enterprises are still heavily dependent on Windows Server 2003 even though there were plenty of warnings that support is coming to an end on July…

IEEE group recommends random MAC addresses for Wi-Fi security

According to new recommendations by an IEEE study group, the Wi-Fi protocol needs to be updated to use randomly generated addresses for better security and…

Who’s winning the mobile payments war?

Mobile payments – using your phone instead of a credit card to make purchases at retail locations – has not taken off. Yet.To read this…

Macros big again with cybercriminals

Up to a year ago, most phishing emails were all about tricking users into clicking on malicious links that led to malware downloads. Starting last…

Cyber-extortionists are liars

The good news about cyber criminals who go in for extortion is that they also tend to be liars. The bad news — they’re extremely…

Banks get attacked four times more than other industries

Modern-day criminals are still following Willie Sutton’s example of going after banks “because there’s where the money is.”According to a new report from Websense Security…

Mobile security: the coming battle of hardware versus software

I’m starting to see signs for Apple Pay and Google Wallet everywhere I go. Google just announced its Android Pay platform and deals with AT&T,…

4 reasons why virtual reality isn’t real yet

UK-based virtual worlds research firm KZero projects that 83 million head-mounted virtual reality display headsets will have been sold by 2018, with a consumer market…

Virtual reality gains a small foothold in the enterprise

The rapid growth of the mobile sector has had an unexpected dividend — by bringing down the costs and improving the quality of motion sensors,…

Microsoft, Cisco, Avaya hone their virtual reality strategies

The leading unified communications (UC) vendors are taking a hard look at the opportunities for virtual reality in the conference room or the boardroom. For…

Open source pitfalls — and how to avoid them

It’s hard to imagine a company these days that isn’t using open source software somewhere, whether it’s Linux running a company’s print and web servers,…