Quantcast
Channel: InfoWorld Tim Greene
Browsing latest articles
Browse All 79 View Live

Black Hat: 9 free security tools for defense and attacking

When Black Hat convenes next week in Las Vegas, it will be a rich environment for gathering tools that can be used to tighten security but also -- in the wrong hands -- to carry out...

View Article


Largest DDoS attack ever delivered by botnet of hijacked IoT devices

Securing the internet of things should become a major priority now that an army of compromised devices – perhaps 1 million strong - has swamped one of the industry’s top distributed denial-of-service...

View Article


Security blogger Krebs says IoT DDoS attack was payback for a blog

Security blogger Brian Krebs says a massive distributed denial-of-service attack that took down his website last week was likely the consequences for his outing of two Israelis who ran a DDoS-for-hire...

View Article

Akamai warns: Look for IoT devices to attack during Thanksgiving, Christmas

The annual holiday uptick in denial of service attacks will likely continue this year only this time with a new devastating weapon: Internet of Things (IoT) devices, according to Akamai.In its...

View Article

IBM sets up test range to practice fighting cybersecurity battles

IBM Security has launched a network-emulation environment where corporate teams can play out attack scenarios so they are better prepared for incidents they might face in the real world.The facility,...

View Article


Cisco scrambling to fix a remote code execution problem in WebEx

Cisco’s Webex Browser Extension contain a critical bug that can open up customers’ entire computers to remote code execution attacks if the browsers visit websites containing specially crafted...

View Article

That Hearbleed problem may be more pervasive than you think

 That lingering Hearbleed flaw recently discovered in 200,000 devices is more insidious than that number indicates.According to a report posted by Shodan, the Heartbleed vulnerability first exposed in...

View Article

IRS-related phishing scams seen running rampant

If this year is anything like last we are in the midst of phishers’ attempts to trick taxpayers, employers and tax preparers into giving up information that will allow attackers to file bogus tax...

View Article


Image may be NSFW.
Clik here to view.

Line between cyber crooks and cyber spies getting more blurry

Cybercriminals acting on behalf of national governments and nation-backed espionage agents carrying out cybercrimes for cash on the side is the future of security threats facing corporations and...

View Article


IBM’s Watson teams up with its SIEM platform for smarter, faster event detection

IBM’s Watson supercomputer can now consult with the company’s security information and event management (SIEM) platform to deliver well researched responses to security events and do so much faster...

View Article

Fortinet upgrades for better cloud, SD-WAN protection

Fortinet has rolled out a new version of its FortiOS operating system that gives customers the ability to manage security capabilities across their cloud assets and software-defined wide area...

View Article

Researchers add software bugs to reduce the number of… software bugs

Researchers are adding bugs to experimental software code in order to ultimately wind up with programs that have fewer vulnerabilities. The idea is to insert a known quantity of vulnerabilities into...

View Article

Waratek upgrades Java protection

Waratek is introducing a feature to its Java-protection platform that enables upgrading to the current version of Java without having to install Java updates or touch the apps running within the Java...

View Article


5 core topics Trump needs to address in Silicon Valley leaders meeting

As some of the tech sector’s heaviest hitters prep for a meeting this week with president-elect Donald Trump, they need to make sure they get answers to critical questions about issues that could...

View Article

Trend Micro: 6 most popular homebrewed terrorist tools

Terrorists are developing and distributing encryption tools that protect privacy of their communications, as well as other homegrown apps that include a news-feed compiler and DDoS attack software,...

View Article

Browsing latest articles
Browse All 79 View Live