"Terrorism has replaced Communism as the rationale for the militarization of [America], for military adventures abroad, and for the suppression of civil liberties at home. It serves the same purpose, serving to create hysteria." -- Howard Zinn, "Terrorism and War"
Mark Gibbs |
18 Feb |
Read more
Criminals in 2012 are increasingly targeting the accounts of business owners and executives as a way to facilitate financial fraud and CIOs can help protect their organizations against these attacks.
Thor Olavsrud |
17 Feb |
Read more
Microsoft's latest Security Essentials update inadvertently warned Internet Explorer (IE) users off Google.com.
Liam Tung |
16 Feb |
Read more
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
Livio Ricciulli, president and chief scientist at MetaFlows Inc. |
14 Feb |
Read more
A former <a href="http://www.networkworld.com/community/blog/does-irs-need-more-options-fight-identity-the">Internal Revenue Service</a> employee this week got 105 months in prison for pleading guilty to theft of government property and aggravated identity theft in a case where the guy tried to get away with nearly $8 million in fraudulent tax returns.
Michael Cooney |
11 Feb |
Read more
Researchers at a university in Bochum, Germany claim to have cracked <a href="http://www.networkworld.com/slideshows/2009/100609-layer8-algorithm.html">encryption algorithms</a> of the European Telecommunications Standards Institute (ETSI) that are used to secure certain civilian satellite phone communications.
Ellen Messmer |
09 Feb |
Read more
Global healthcare provider Best Doctors employs the most robust technologies and practices available to protect the privacy of its members' personal data—but that's just a part of doing business in this industry. Less obvious but equally important is the degree of vigilance with which the company <a href="http://www.csoonline.com/article/494853/brand-protection-the-expanding-cso-portfolio">protects its brand name</a>, which is trademarked in dozens of countries worldwide.
Lauren Gibbons Paul |
07 Feb |
Read more
With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor <a href="http://www.cbsnews.com/8301-501465_162-57365004-501465/judge-americans-can-be-forced-to-decrypt-their-laptops/">US District Court ruling</a> on fifth amendment password protection rights, it is time you actually encrypt your data properly.
Ben Rothke and David Mundhenk |
02 Feb |
Read more
It's been known for some time that there are security issues associated with the increasing use of <a href="http://www.pcworld.com/article/194177/researchers_work_to_create_secure_rfid_tags.html">RFID tags</a> in credit cards, but this past weekend afforded a fresh demonstration of just how easy it is for hackers to take advantage of them.
Katherine Noyes |
02 Feb |
Read more
The Obama Administration on Saturday announced it will veto the controversial Stop Online Piracy Act due to the threat the bill posed to the security of the internet's architecture.
Liam Tung |
16 Jan |
Read more
In the world of data leaks and cybercrime, why is it that selling information security is considered a hard task? Is it because information security is pitched as a tool—buy software and it will fix everything—or is there a lack of understanding about what a healthy information security posture will achieve for an organisation.
Puneet Kukreja |
11 Jan |
Read more
HP has refuted claims by researchers at Columbia University that a security flaw in its HP's LaserJet printer could give a hacker remote access to the device and the power to set it on fire.
Liam Tung |
30 Nov |
Read more
The Australian Government's electronic answer to the nation's $1 billion identity theft problem -- the Document Verification Service (DVS) -- has processed 200,000 verifications, according to the Attorney General's Department (AGD).
Liam Tung |
14 Nov |
Read more
Is there justice in cyberspace? The U.S. Department of Justice (DOJ) last week offered hope there is, <a href="http://www.networkworld.com/news/2011/110911-doj-charges-seven-in-massive-252945.html">charging seven individuals</a> with 27 counts of wire fraud and other computer-related crimes in connection with a massive "clickfraud" scheme that was based in Estonia.
Ellen Messmer |
12 Nov |
Read more
Ever been in an argumentative mood? Well, last week we were, with editors here coming up with 33 red-hot arguments, such as open source vs. proprietary, or which browser is better.
Ellen Messmer |
05 Nov |
Read more
Whether you celebrated National Identity Fraud Awareness Week (NIFAW) with a large identity cake or just shrieked 'Who Are You?' and other identity-inspired songs with friends over a beer or four, the campaign has run its course for another year -– and reminded those who were listening that we're still living in a world of trusting, naïve fools.
David Braue |
02 Nov |
Read more
In last week's news, Amazon Web Services vulnerabilities <a href="http://www.networkworld.com/news/2011/102611-security-cloud-252406.html">were found and fixed</a>, but other cloud service providers are probably susceptible to similar problems <a href="http://www.networkworld.com/news/2011/102611-researchers-demo-cloud-security-issue-252403.html">discovered by a German research team</a> at Ruhr University Bochum.
Ellen Messmer |
29 Oct |
Read more
The default settings for Apple’s new iPhone 4S personal assistant Siri allows anyone to give it commands when it’s password-locked.
Liam Tung |
21 Oct |
Read more
The team behind Stuxnet, the complex malware used to attack Iran's nuclear program earlier this year, has produced another worm, dubbed "Duqu" by McAfee Labs.
Stilgherrian |
19 Oct |
Read more
Destroying data to protect against fraud.
Neerav Bhatt |
18 Oct |
Read more