Network Security — News

"Depraved" Wi-Fi hacker gets 18 years in prison

A Minnesota man has been sentenced to 18 years in prison after he hacked a neighbor's Wi-Fi <a href="http://www.networkworld.com/news/2009/120909-network-router-cheat-sheet.html?ts0hb&amp;story=rtrcheat">router</a> and then launched a vengeful two-year campaign to frame them with child pornography and threats to government officials, including Vice President Joe Biden.

John Cox | 14 Jul | Read more

Lulzsec: the rise and fall of a hacking collective

The curtain has fallen on the 50 day performance by hacker group LulzSec. Its campaign of mayhem and destruction, peppered with witty commentary captivated the world. In an alternate universe where Lulzcats reign and anti-security is the norm, it might have even earned a spot on its first target, The X-Factor. But on this earth its members may still be captured by its later targets: the CIA, US law enforcement and the FBI.

Liam Tung | 12 Jul | Read more

Mobile payments, PCI DSS compliance: Some clarity

Mobile payments technology is a loud sonic boom thundering through the payments industry. But are all -- or any -- of these payment schemes compliant with the <a href="http://www.csoonline.com/article/519563/the-great-pci-security-debate-of-2010-transcribed">Payment Card Industry Data Security Standard (PCI DSS?)</a>

George V. Hulme | 05 Jul | Read more

Arizona State Police Hit with Second Data Dump

Arizona State Police recently fell victim to a <a href="http://www.pcworld.com/businesscenter/article/231067/lulzsec_said_it_leaked_arizona_police_documents.html">second embarrassing data dump</a> that included information stolen from the personal e-mail accounts of 12 Arizona police officers. The stolen data, according to the hackers, includes names, addresses, phone numbers, passwords, Social Security numbers, online dating account info, voicemails, chat logs, internal police reports, and racist chain e-mails. Hackers also say they nabbed the personal data of Stephen Harrison, a spokesman for the Arizona Department of Public Safety.

Ian Paul | 01 Jul | Read more

Report: FBI Steps Up Hunt for LulzSec

<a href="http://www.pcworld.com/article/231213/anonymous_picks_up_slack_as_lulzsec_calls_it_quits.html">Lulz Security</a> may be officially disbanded after 50 days of online hijinks including raids against the servers of <a href="http://www.pcworld.com/article/231201/lulzsec_says_goodbye_with_new_data_dump.html">NATO</a>, the <a href="http://www.pcworld.com/businesscenter/article/230235/lulzsec_sets_sights_on_us_senate_and_gamemaker_bethesda.html">U.S. Senate</a>, <a href="http://www.pcworld.com/article/228983/hackers_deface_pbs_site_promise_more_lulz.html">PBS</a> and <a href="http://www.pcworld.com/article/231215/lulzsec_a_short_history_of_hacking.html">many others</a>. But law enforcement officials are still actively searching for the rogue hackers. So far, however, it appears the law is coming up empty. FBI agents recently descended on the home of Iowa resident Laurelai Bailey hoping to find out more information about the February hack into security firm <a href="http://www.pcworld.com/businesscenter/article/220209/lessons_learned_thanks_to_hbgary_and_anonymous.html">HBGary Federal</a>, according to <a href="http://gawker.com/5816291">Gawker</a>.

Ian Paul | 30 Jun | Read more

Protect Your Company With Web Filtering Tools

Access to the Internet is vital for doing business, but without safeguards in place, malware and data leaks can be a mouse click away from disaster. Network firewalls and <a href="http://www.pcworld.com/reviews/collection/6706/top_paid_antivirus_for_2011.html">antivirus software</a> are common in workplaces, but more small companies are increasingly turning to Web filtering tools for additional protection.

Elsa Wenzel | 29 Jun | Read more

Symantec finds big differences in iOS, Android security

<a href="http://www.networkworld.com/slideshows/2009/060309-apple-quiz.html">Apple</a> iOS and Google <a href="http://www.networkworld.com/news/2010/110910-google-android-useful-resources-smartphones.html">Android</a> have some big differences when it comes to mobile <a href="http://www.networkworld.com/topics/security.html">security</a>, creating distinct potential vulnerabilities for enterprises embracing devices running these operating systems, according to analysis by Symantec.

John Cox | 29 Jun | Read more

Gartner: new security demands arising for virtualisation, cloud computing

The rush toward virtualisation of internal enterprise computing resources and cloud computing can have many advantages, such as server consolidation, but it's largely outracing traditional security and identity management practices. That's leaving huge gaps, a sense of chaos and questions about where security products and services should be applied in the world of multi-vendor virtual-machine (VM) hypervisors.

Ellen Messmer | 24 Jun | Read more