In Pictures: Biggest, baddest, boldest software backdoors of all time
These 12 historically insidious backdoors will have you wondering what’s in your software -- and who can control it
13 Jun | View galleries
One of Australia’s top communications law think tanks has challenged the legality of online service provider privacy agreements with consumers in a new report released yesterday.
Andrew Colley | 15 Sep | Read more
Google has published a proposal to kill one of the most widely attacked and buggy pieces of software on the internet.
The recent massive hack of Panamanian law firm Mossack Fonseca – and the publication of its trove of confidential information in a publicly-searchable format that has cast suspicions on everyone from David Cameron to Emma Watson to cybercriminals themselves – is the kind of “extinction-level event” that businesses should better prepare for when their viability is entirely based on trust, one security consultant has warned.
David Braue | 12 May | Read more
Oracle's latest quarterly security update contains 136 fixes for flaws in a wide range of products including Oracle Database Server, E-Business Suite, Fusion Middleware, Oracle Sun Products, Java and MySQL.
Lucian Constantin | 20 Apr | Read more
CERT advisory urges QuickTime removal due to vulnerabilities, Apple does too
Steve Ragan | 18 Apr | Read more
A few weeks back, after the Working Mac column about scanning your Mac for viruses I received an email message from Yolanda:
Jeffery Battersby | 26 Jun | Read more
We originally published this article about a year ago, but in light of Lenovo's Superfish fiasco, cleaning crapware off your PC is now more relevant than ever. For Superfish-specific instructions, see our handy guide here. But even if you don't own one of the affected Lenovo PCs, the following guide should still prove helpful.
Chris Hoffman | 20 Feb | Read more
Given the countless reports of our data being exploited, many of us are increasingly concerned about protecting that data. In this movie I'm going to show you how to protect a collection of data on your Mac.
Christopher Breen | 27 Nov | Read more
On the surface, the critical "Shellshock" bug revealed this week sounds devastating. By exploiting a bug in the Bash shell command line tool found in Unix-based systems, attackers can run code on your system--essentially giving them access to your system. Bad guys are already developing exploits that use Shellshock to crack your passwords and install DDoS bots on computers. And since Bash shell is borderline ubiquitous, a vast swath of devices are vulnerable to Shellshock: Macs, Linux systems, routers, web servers, "Internet of Things" gizmos, you name it.
Brad Chacos | 27 Sep | Read more
On Tuesday, BitTorrent (the company) launched Sync 1.4, a brand new version of its peer-to-peer file syncing app that makes sharing folders with others a breeze. We have an in-depth hands-on with Sync 1.4 that will teach you how to use the app if you're not familiar with it.
When their data has been stolen, and is being held hostage, companies are increasingly caving in to cybercriminal demands for payment. Short of paying up, the best defense is a good offense.
Jonathan Hassell | 21 Apr | Read more
Midsized companies with revenues from $100 million to $1 billion spent an average of $3 million on information security as of 2014 per "The Global State of Information Security Survey 2015" from PwC.
David Geer | 18 Aug | Read more
Security experts and users follow a drastically different set of best practices to protect their security online, according to a new report from Google.
Kristin Burnham | 12 Aug | Read more
230 million patients. 3,300 hospitals. 900,000 healthcare professionals. 98 percent of U.S. pharmacies. More than 700 different electronic health record platforms. 764 million medication histories. 6.5 billion transactions processed last year alone.
Maria Korolov | 17 Jul | Read more
"Caveat emptor" - buyer beware - is the most common warning to those shopping for big-ticket items. That, apparently, applies in spades to buying cyber insurance.
Taylor Armerding | 10 Jul | Read more
NetworkWorld Asia gleaned our resources, as well as those of our partners, research analysts and CIOs in the region, to bring you what we consider the top 10 information security issues for 2015 and 2016, as well as some suggested solutions from experts for your reference.