With SSL, who can you really trust?
SSL, the encryption scheme that protects virtually all secure online transaction, requires that users rely on trusted third parties, but what if they can't be trusted?
Tim Greene | 19 Aug | Read more
SSL, the encryption scheme that protects virtually all secure online transaction, requires that users rely on trusted third parties, but what if they can't be trusted?
Tim Greene | 19 Aug | Read more
Halfway through a 90-day trial, the Department of Defense says it has stopped hundreds of attempted intrusions it would have missed otherwise without its <a href="http://www.networkworld.com/news/2011/061711-military-cyber-threat.html">pilot program</a> of sharing classified information about cyber threats with military contractors.
Tim Greene | 18 Aug | Read more
Hack week in Vegas During the Black Hat and Defcon conferences in Las Vegas last week, researchers wheeled out their best new attacks on everything from browsers to automobiles, demonstrating ingenuity and diligence in circumventing security efforts or in some cases in exploiting systems that were built without security in mind. Here's a handful of the ones that deserve the most concern.
Tim Greene | 18 Aug | Read more
Files entrusted to cloud-storage provider Dropbox were susceptible to unauthorized access via three attacks devised by security researchers, but the provider has since closed the vulnerabilities.
Tim Greene | 18 Aug | Read more
Spam - particularly the kind with malicious attachments - is exploding, reaching a two-year high overall, which includes the spike last fall just before the SpamIt operation folded its doors, a security firm says.
Tim Greene | 18 Aug | Read more
A sizeable spike in <a href="http://www.networkworld.com/news/2011/051811-microsoft-one-in-14-downloads.html">malicious email attachments</a> is just subsiding, but if history is any indicator, several smaller spikes are about to follow that use even more deceptive means than their predecessors.
Tim Greene | 17 Aug | Read more
LAS VEGAS -- The relationship between CISOs and <a href="http://www.networkworld.com/topics/security.html">security</a> penetration testers is anything but clear-cut and raises ethical issues for both parties, a Defcon crowd heard from a former CISO.
Tim Greene | 08 Aug | Read more
LAS VEGAS -- Anonymous has run up quite a score against corporations, governments and law enforcement agencies, but for all these warnings corporate executives are turning their heads from the real problem -- their network security is terrible, a panel of experts concluded at Defcon.
Tim Greene | 09 Aug | Read more
While still not great, the operating systems behind Apple desktops, laptops and phones are getting more secure, <a href="http://www.networkworld.com/news/2011/080411-blackhat-overview.html?hpg1=bn">researchers at Black Hat</a> say.While not recommended for corporate use unless it’s in islands within larger networks, the OSX operating system has made strides, says Alex Stamos, who lead a team of researchers from iSec Partners that researched the OSX and Windows 7 operating systems.
Tim Greene | 08 Aug | Read more
<a href="http://www.networkworld.com/reviews/2011/052311-check-point-blade-test.html">Check Point Software</a> has new, heavy-duty <a href="http://www.networkworld.com/topics/security.html">security</a> gateway hardware for data centers and service providers, including one chassis that will grow to support a 1Tbps firewall.
Tim Greene | 03 Aug | Read more
Soon it will be practicable to take someone's photo on a smartphone and within minutes know their Social Security number and a range of other private data like their personal interests, sexual preference and credit status, researchers will tell the Black Hat security conference this week.
Tim Greene | 02 Aug | Read more
Among the thousands of security experts at the Black Hat, Defcon and Security BSides conferences next week in Las Vegas, some will surely test whether they can break into nearby laptops, phones, networks -- even RFID-enabled room keys and credit cards.
Tim Greene | 30 Jul | Read more
Law enforcement may be interested to see if anyone actually shows up to this year to accept the annual <a href="http://pwnies.com/nominations/">Pwnie Award</a> for Epic Ownage at Black Hat, since all the nominees face possible criminal charges.
Tim Greene | 27 Jul | Read more
Google+ may be getting some attention it doesn't want -- from Anonymous, which says it will target the new social networking site that launched last month.
Tim Greene | 19 Jul | Read more
In its new <a href="http://www.defense.gov/news/d20110714cyber.pdf">cyberdefense strategy</a>, the <a href="http://www.networkworld.com/news/2011/071511-pentagon-unveils-five-steps-for.html?hpg1=bn">Pentagon is drawing on lessons</a> about agility, lifecycle management and supply-chain protection that have already been learned by private corporations.
Tim Greene | 16 Jul | Read more