Duqu hackers scrub evidence from command servers, shut down spying op
The hackers behind the Duqu botnet have shut down their snooping operation, a security researcher said today.
Gregg Keizer | 01 Dec | Read more
The hackers behind the Duqu botnet have shut down their snooping operation, a security researcher said today.
Gregg Keizer | 01 Dec | Read more
Do small to midsize businesses (SMB) think they're somehow immune to <a href="http://www.networkworld.com/topics/security.html">security</a> threats?
Ellen Messmer | 16 Nov | Read more
Australia has experienced a declining participation in government-lead critical infrastructure protection (CIP) programs this year due to fewer resources, according to a new survey from Symantec.
Hamish Barwick | 14 Nov | Read more
Microsoft on October 25 added the Poison Ivy remote access tool (RAT) to its automated malicious software removal tool for Windows machines, reflecting heightened concerns over a malware kit that has been around since 2005.
The odds are that Microsoft won't patch the Windows kernel bug next week that the Duqu remote-access Trojan exploits to plant itself on targeted PCs, a researcher said today.
Gregg Keizer | 02 Nov | Read more
Attackers used an off-the-shelf Trojan horse to sniff out secrets from nearly 50 companies, many of them in the chemical and defense industries, Symantec researchers said today.
Gregg Keizer | 01 Nov | Read more
In last week's news, Amazon Web Services vulnerabilities <a href="http://www.networkworld.com/news/2011/102611-security-cloud-252406.html">were found and fixed</a>, but other cloud service providers are probably susceptible to similar problems <a href="http://www.networkworld.com/news/2011/102611-researchers-demo-cloud-security-issue-252403.html">discovered by a German research team</a> at Ruhr University Bochum.
Ellen Messmer | 29 Oct | Read more
As more business smartphone users demand remote access to corporate documents, organisations need to be wary of what app makers mean when they claim their apps are “business class”.
It's a late night, and you've fired up Facebook on your ACME.com company-owned iPad to post some bad news. "A reduction in workforce is going to happen this week," you type into your update status field and tap the post button.
Tom Kaneshige | 05 Oct | Read more
Concerned about sensitive corporate data that lives on employees' iPads finding their way to places they shouldn't? Symantec says it has an answer to that risk, and it won't get in users' way. In early 2012, it plans to deliver an extension to its data loss prevention (DLP) product that enables DLP filtering from the iPad or, more precisely, from files, emails, and any other communication sent via HTTP and HTTPS from an iPad through the network.
Galen Gruman | 04 Oct | Read more
Development of enterprise mobile apps has been moving more slowly than development of consumer-facing apps, according to Gartner. One main reason is IT leaders' concerns about the security of mobile devices, which are often employees' personal devices, and are vulnerable to being lost, hacked or stolen. While there are plenty of established tools and practices for keeping Web visitors from straying (or hacking) into sensitive corporate data, managing security across a diverse set of mobile devices remains a challenge, IT experts say.
Elisabeth Horwitt | 29 Sep | Read more
If there's gold in log files, Splunk, Inc's Splunk will help you to find it. Splunk bridges the gap between simple log management and security information and event management (SIEM) products from vendors such as ArcSight, RSA, Q1 Labs, and Symantec.
Joel Snyder | 26 Sep | Read more
Talk about disconnect! Analysts, security engineers and other infosec geeks aim for Swiss-watch precision, because one little mistake means the bad guys win. We want people to take this seriously, right? So why do certain marketing and PR departments spread a load of what my father, a man more polite than me, would have called "bulldust"?
Stilgherrian | 13 Sep | Read more
There's a thunderbolt of change coming in cloud-based identity management, with new possibilities for single sign-on (SSO) and provisioning through cloud-based services.
Ellen Messmer | 09 Sep | Read more
<a href="http://buy.norton.com/estore/mf/productDetails/slotNo/-1/productSkuCode/21171898/">Norton Internet Security (NIS) 2012</a> adds new features to the suite's toolkit, including those to enhance PC performance and make some basic use of the <a href="http://www.computerworld.com/s/topic/158/Cloud+Computing">cloud</a>; it also adds some tweaks to the interface. This is not a major overhaul, but the addition of new tools makes a useful piece of protection software even more valuable.
Preston Gralla | 08 Sep | Read more