Dropbox fixes flaw that exposed user documents
Dropbox has patched a vulnerability that made it possible for unauthorized people to view documents that had been shared through the online file-sharing service.
Antone Gonsalves | 07 May | Read more
Dropbox has patched a vulnerability that made it possible for unauthorized people to view documents that had been shared through the online file-sharing service.
Antone Gonsalves | 07 May | Read more
The moment I walk into the 3D Cannabis Center in Denver, Colorado, I'm approached by a security guard, taser on his hip, who requests my identification. As I fumble around in my wallet for my driver's license, I take a look around the lobby and spot at least three different cameras staring right back at me -- and this was after walking past multiple cameras outside just to get in the front door. After explaining that I'm here for an appointment with Toni Fox, the store's owner, I'm issued a badge and asked to sign in before taking a seat and waiting while she's notified of my arrival.
Grant Hatchimonji | 07 May | Read more
Target CEO Gregg Steinhafel's resignation Monday as president, CEO and chairman of the Board of the company likely isn't a sign that boards of directors are now holding chief executives accountable for massive data breaches.
Jaikumar Vijayan | 06 May | Read more
The Federal Communications Commission's in-house IT infrastructure has to modernize, in order to save money and become more efficient, according to FCC CIO David Bray.
Failures in patch management of vulnerable systems have been a key enabler of cybercrime, according to the conclusions reached in Solutionary's annual Global Threat Intelligence Report out today, saying it sees botnet attacks as the biggest single threat.
Ellen Messmer | 27 Mar | Read more
Microsoft is issuing five security bulletins this month, two of them critical and affecting all versions of Internet Explorer as well as all versions of Windows from XP to 8/8.1.
Tim Greene | 06 Mar | Read more
Cisco Systems released new firmware versions for some of its small business routers and wireless LAN controllers in order to address vulnerabilities that could allow remote attackers to compromise the vulnerable devices or affect their availability.
Lucian Constantin | 06 Mar | Read more
After acquiring mobile application management company Bitzer Mobile late last year, Oracle today announced that it has taken Bitzer's basic "container" technology for Apple ioS and Google Android and linked it to identity management.
Ellen Messmer | 26 Feb | Read more
Microsoft is issuing critical patches for flaws found in Windows 7, 8 and RT desktops as well as for the spam and malware filter for Microsoft Exchange server.
Tim Greene | 06 Feb | Read more
These scorned IT staffers had their vengeance on their former employers -- but most got their comeuppance in the end.
Josh Fruhlinger | 30 Jan | Read more
The top IT security chiefs make salaries that can run over $1 million per year, but are they happy? Ponemon Institute, which interviewed about 700 security professionals in the top IT security spot at their companies to find out, learned they make big bucks but the job often feels stressful and isolated.
Ellen Messmer | 17 Dec | Read more
Tony Hayes, ISACA international president, talks about the trends that CIOs should prepare for, and the "inexcusable" high rate of failed ICT projects.
Divina Paredes | 11 Dec | Read more
Network World tested hundreds of products in 2013, but here are our top 10 tests of the year. In order to make the list, the product review had to be a comparative test of multiple products in a single category and it had to break new ground or deliver fresh insight into an important product area.
Neal Weinberg | 11 Dec | Read more
The problem with IT security professionals is they spend too much time stopping business people from trying new things, including cloud services, out of worries about risk when they should really be working directly with business managers to help them innovate by means of security.
Ellen Messmer | 05 Dec | Read more
Start-up Sideband Networks today came out of stealth mode with an appliance that it says can model live traffic to give visibility into applications and user devices in order to solve performance problems.
Ellen Messmer | 12 Nov | Read more