Latest articles for Network World

Darkode forum is back, but a shadow of its former self

Last summer, law enforcement agencies from 20 countries joined forces to shut down the notorious Darkode hacking forum. Organizers said they would be back, stronger…

US cyber criminal underground a shopping free-for-all

According to a new report by Trend Micro, the North American cyber criminal underground isn’t buried as deep as in other geographies.”It doesn’t exist in…

Most hackable devices

Consumer devices vulnerableThere are now more than 3 billion connected devices in use by consumers, according to Gartner, and this number will increase to 4…

10 riskiest applications that have passed their expiration dates

ExpiredImage by ThinkstockApplications that have reached the ends of their lives are no longer maintained by their original developers, and do not receive security updates.…

Despite recent moves against Adobe, 80% of PCs run expired Flash

Despite recent moves against Adobe Flash by Google and Firefox and its declining use by websites, Adobe Flash remains a significant security vulnerability for end…

Experts urge caution when putting health data in the cloud

Healthcare has become a favorite target for criminals, and some medical organizations are reacting by looking at outside providers to keep their data secure. But…

Does security awareness training even work?

The other day, I was in a room full of CIOs, CTOs and CISOs who — as an ice-breaking activity — were asked to share…

As containers take off, so do security concerns

Containers offer a quick and easy way to package up applications and all their dependencies, and are popular with testing and development.According to a recent…

Corebot cleverly written botnet malware with growth potential

There’s a new botnet malware on the loose, called Corebot, that researchers believe has the potential to develop into a significant threat.The malware was first…

Attackers go on malware-free diet

To avoid detection, some hackers are ditching malware and living “off the land” — using whatever tools are already available in the compromised systems, according…

MIT scores worst in cybersecurity

In a cybersecurity survey of 485 large colleges and universities, the Massachusetts Institute of Technology came in at the bottom of the list.In a report…

Security experts mostly critical of proposed threat intelligence sharing bill

This fall, the Senate is expected to take another look at the Cybersecurity Information Sharing Act, or CISA, but many security experts and privacy advocates…

Ashley Madison still a top lure for scammers and crooks

The Ashley Madison breach has been a Christmas-in-August present for spammers and scammers of all kinds, and your company could be the next target. Here…

Court: FTC can take action on corporate data breaches

The US Court of Appeals has ruled that the FTC mandate to protect consumers against fraudulent, deceptive and unfair business practices extends to oversight of…

Study: 81% of large health care organizations breached

In the past two years, 81 percent of hospitals and health insurance companies have had a data breach, according to a report released by KPMG.”These…

Intel: Criminals getting better at data exfiltration

Enterprises tend to be highly focused on keeping attackers out of their systems, but most of the actual damage happens not when the bad guys…

The Web’s ten most dangerous neighborhoods

Wouldn’t it be convenient if all the spam and malware sites were all grouped together under one top-level domain — .evil, say — so that…

CSO burnout biggest factor in infosec talent shortage

The real cause of the talent shortage in the information security field isn’t a lack of new people entering the profession, but retention and churn…

Amazon dumps Flash, and the Web is better off

Amazon will stop accepting Flash ads on its advertising network on Tuesday, and it will help make the entire Web more secure, security experts say.…

Most corporate risk due to just 1% of employees

Just 1 percent of employees are responsible for 75 percent of cloud-related enterprise security risk, and companies can dramatically reduce their exposure at very little…

Tips for protecting your business against cyber extortion

CrytoLocker is malware cyber criminals use to encrypt the contents of a computer until users pay up.But that’s only one type of cyber extortion, according…

Review: Canonical continues cloud push with Ubuntu 15.04

According to the latest statistics from The Cloud Market, Ubuntu now accounts for 59% of all images on the Amazon EC2 platform. Windows has 8%,…

GameOver ZeuS criminals spied on Turkey, Georgia, Ukraine and OPEC

The criminals behind the GameOver ZeuS Botnet didn’t just steal $100 million from banks — they also spied on several countries on behalf of Russia,…

T-Mobile caught in crossfire of injected ad war with Flash Networks

LAS VEGAS – An ongoing conflict between website owners and ad injectors who place unwanted ads on those websites has just flared up into full-blown war,…

Neiman Marcus case a reminder to check your cyber coverage

In a decision that should send major corporations to double-check their cyberinsurance, a federal appeals court ruled Monday that retail customers could go ahead and…

Neiman Marcus case a reminder to check your cyber coverage

In a decision that should send major corporations to double-check their cyberinsurance, a federal appeals court ruled Monday that retail customers could go ahead and…

Google Drive phishing is back — with obfuscation

If you have a Google account and a stranger sends you a link to a document on Google Drive, think twice before clicking — it…

All smartwatches have security flaws

In a recent security assessment of ten smartwatches and their iOS and Android companion applications, every single watch had at least one significant security flaw,…

InfoSec pros spend most time, money on self-inflicted problems

According to a new survey of Black Hat attendees released last week, InfoSec professionals are spending the biggest amount of their time and budgets on…

EFF celebrates 25 years of defending online privacy

The Electronic Frontier Foundation is the digital world’s top watchdog when it comes to privacy and free expression.But while cops and firefighters are often ready…