Don't-Miss Stories

Lessons from the hack attack on The New York Times

No single technology can combat a sophisticated attack like the one against the media company, say security experts, who recommend layers of protection and surveillance.

Printers join fray in network vulnerability landscape

Google find of 86,800 public HP printers could prompt cybercriminals to penetrate corporate networks or steal sensitive documents, expert warns

Researcher: UPnP flaws expose millions of networked devices to remote attacks

Tens of millions of network-enabled devices including routers, printers, media servers, IP cameras, smart TVs and more can be attacked over the Internet because of dangerous flaws in their implementation of the UPnP (Universal Plug and Play) protocol standard, security researchers from Rapid7 said Tuesday in a research paper.

Red October malware discovered after years of stealing data in the wild

This piece of malware has been stealing data from diplomatic, government, and scientific research computer networks for more than five years.

Swartz suicide shines light on Computer Fraud and Abuse Act

Federal anti-hacking law is applied too broadly in alleged data theft cases, critics say

Network History: Why it's important and who's responsible for it

The network monitoring industry has been around for a long time, but it's still an immature science relative to other information technologies.

Hacker gang touts unlimited supply of zero-day bugs

The Elderwood gang specializes in finding and exploiting zero-day vulnerabilities in Microsoft's IE browser and Adobe's Flash Player.


Survey finds most networks are out of control

An alarming number of companies grant admin rights to users and have no idea what software is installed on their PCs, says a survey of IT professionals.

Terahertz Scanners, Drugs, and Shoes

A new technology will make it ridiculously easy to see if you are carrying or have consumed drugs or touched or have explosives on you.

Playing Politics with Cybersecurity

While elected officials argue over cybersecurity legislation, the critical infrastructure of the nation remains vulnerable.