The Australian Competition and Consumer Commission's SCAMWatch has warned of a new remote access scam, with perpetrators impersonating Telstra or BigPond employees and requesting remote access to a mark's computer.
TechWorld staff |
02 Aug |
Read more
As computational power rises exponentially, not linearly, so does the rate of change - and that means the next 10 years should pack in far more technological change than the last 10.
Julie Bort |
16 Jul |
Read more
A Minnesota man has been sentenced to 18 years in prison after he hacked a neighbor's Wi-Fi <a href="http://www.networkworld.com/news/2009/120909-network-router-cheat-sheet.html?ts0hb&story=rtrcheat">router</a> and then launched a vengeful two-year campaign to frame them with child pornography and threats to government officials, including Vice President Joe Biden.
John Cox |
14 Jul |
Read more
The curtain has fallen on the 50 day performance by hacker group LulzSec. Its campaign of mayhem and destruction, peppered with witty commentary captivated the world.
In an alternate universe where Lulzcats reign and anti-security is the norm, it might have even earned a spot on its first target, The X-Factor. But on this earth its members may still be captured by its later targets: the CIA, US law enforcement and the FBI.
Liam Tung |
12 Jul |
Read more
Code that exploits two iPhone flaws to allow people to jailbreak their devices could, ironically, force security-conscious users to use the vulnerabilities to jailbreak their own iPhones and apply a third-party patch.
Robert Lemos |
09 Jul |
Read more
A consortium of eight companies launched a campaign on Tuesday to provide better training for law enforcement agencies in order to tackle cybercrime, which costs the U.K. economy tens of billions of pounds annually.
Jeremy Kirk |
06 Jul |
Read more
Mobile payments technology is a loud sonic boom thundering through the payments industry. But are all -- or any -- of these payment schemes compliant with the <a href="http://www.csoonline.com/article/519563/the-great-pci-security-debate-of-2010-transcribed">Payment Card Industry Data Security Standard (PCI DSS?)</a>
George V. Hulme |
05 Jul |
Read more
Arizona State Police recently fell victim to a <a href="http://www.pcworld.com/businesscenter/article/231067/lulzsec_said_it_leaked_arizona_police_documents.html">second embarrassing data dump</a> that included information stolen from the personal e-mail accounts of 12 Arizona police officers. The stolen data, according to the hackers, includes names, addresses, phone numbers, passwords, Social Security numbers, online dating account info, voicemails, chat logs, internal police reports, and racist chain e-mails. Hackers also say they nabbed the personal data of Stephen Harrison, a spokesman for the Arizona Department of Public Safety.
Ian Paul |
01 Jul |
Read more
Time may be running out for the members of LulzSec as police continue to step up their inquiries into the hacking group.
Robert McMillan |
30 Jun |
Read more
A new and improved botnet that has infected more than four million PCs is "practically indestructible," security researchers say.
Gregg Keizer |
30 Jun |
Read more
Democratic members of a Senate committee promised Wednesday to push hard for new online privacy protections and for legislation that would require companies to put security monitoring tools on their networks.
Grant Gross |
30 Jun |
Read more
If companies patch the most popular 37 Windows programs, they could cut their risk by 80 percent, according to a report released on Wednesday by vulnerability management and information firm Secunia.
Robert Lemos |
30 Jun |
Read more
Millions of PCs around the world appear to have been quietly infected by the dangerous TDSS 'super-malware' rootkit as part of a campaign to build a giant new botnet, researchers from security firm Kaspersky Lab have discovered.
John E Dunn |
30 Jun |
Read more
<a href="http://www.pcworld.com/article/231213/anonymous_picks_up_slack_as_lulzsec_calls_it_quits.html">Lulz Security</a> may be officially disbanded after 50 days of online hijinks including raids against the servers of <a href="http://www.pcworld.com/article/231201/lulzsec_says_goodbye_with_new_data_dump.html">NATO</a>, the <a href="http://www.pcworld.com/businesscenter/article/230235/lulzsec_sets_sights_on_us_senate_and_gamemaker_bethesda.html">U.S. Senate</a>, <a href="http://www.pcworld.com/article/228983/hackers_deface_pbs_site_promise_more_lulz.html">PBS</a> and <a href="http://www.pcworld.com/article/231215/lulzsec_a_short_history_of_hacking.html">many others</a>. But law enforcement officials are still actively searching for the rogue hackers. So far, however, it appears the law is coming up empty. FBI agents recently descended on the home of Iowa resident Laurelai Bailey hoping to find out more information about the February hack into security firm <a href="http://www.pcworld.com/businesscenter/article/220209/lessons_learned_thanks_to_hbgary_and_anonymous.html">HBGary Federal</a>, according to <a href="http://gawker.com/5816291">Gawker</a>.
Ian Paul |
30 Jun |
Read more
Access to the Internet is vital for doing business, but without safeguards in place, malware and data leaks can be a mouse click away from disaster. Network firewalls and <a href="http://www.pcworld.com/reviews/collection/6706/top_paid_antivirus_for_2011.html">antivirus software</a> are common in workplaces, but more small companies are increasingly turning to Web filtering tools for additional protection.
Elsa Wenzel |
29 Jun |
Read more
With the surge in <a href="http://blogs.csoonline.com/hacktivism">hacktivism</a> and nation-state espionage in recent years, not to mention the continuing high levels of cybercrime, companies need better tools to evaluate the quality of any developer's code.
Robert Lemos |
29 Jun |
Read more
<a href="http://www.networkworld.com/slideshows/2009/060309-apple-quiz.html">Apple</a> iOS and Google <a href="http://www.networkworld.com/news/2010/110910-google-android-useful-resources-smartphones.html">Android</a> have some big differences when it comes to mobile <a href="http://www.networkworld.com/topics/security.html">security</a>, creating distinct potential vulnerabilities for enterprises embracing devices running these operating systems, according to analysis by Symantec.
John Cox |
29 Jun |
Read more
One of the most controversial figures in Russia's online world, ChronoPay co-founder and CEO Pavel Vrublevsky, has been arrested on suspicion of ordering a DDoS attack against a rival firm.
John E Dunn |
27 Jun |
Read more
The rush toward virtualisation of internal enterprise computing resources and cloud computing can have many advantages, such as server consolidation, but it's largely outracing traditional security and identity management practices. That's leaving huge gaps, a sense of chaos and questions about where security products and services should be applied in the world of multi-vendor virtual-machine (VM) hypervisors.
Ellen Messmer |
24 Jun |
Read more
If it sometimes appears that just about every company is getting hacked these days, that's because they are.
Jaikumar Vijayan |
23 Jun |
Read more