Chicago-based Walsh Group Construction is finding that buying into Microsoft's Office 365 and Enterprise Mobility Suite is yielding a mixed bag of benefits -- better BYOD, cost-saving, time-saving, increased productivity -- but adopting the cloud services required a dose of blind trust in their security.
The US Central Command Twitter account was hacked or at least defaced today apparently by ISIS (Islamic State of Iraq and Syria), posting tweets that threaten families of US soldiers and claiming to have hacked into military PCs.
U.S. officials now believe North Korea is behind the attack that took down Sony Pictures Entertainment's computer network and posted contents on the Internet, but the government hasn't decided whether to formally accuse the country of carrying out the hack, according to The New York Times.
Vendors of mobile devices are lining up to implement an authentication scheme meant to make online transactions both simpler and more secure, known as the Fast Identity Online (FIDO) specification, which is being released today.
There is an increase in use of complex crimeware that gathers the passwords of online customers at specific banks and automatically transfer funds out of their accounts, according to Akamai's security group.
OpenDNS has developed a partner API that lets security vendors connect their technologies to the OpenDNS cloud for enforcement, effectively extending protection to any device no matter where it connects to the Internet.
Startup TrustPipe is announcing a security platform that categorizes network-based attacks and blocks them. The company claims that in two years of testing the software has never let attackers compromise the systems it has been protecting.
For more than a year attackers dubbed FIN4 have been stealing insider information that could affect stock prices by hacking email accounts of key corporate executives and others privy to sensitive deals, according to a report by security vendor FireEye.
Cyber Monday is the biggest online shopping day of the year, which means it is also the single biggest opportunity for criminals to steal cash, personal information and credit card numbers, and they've got an imposing arsenal to carry out their plans against the unwary.
Regin, a complex and stealthy piece of espionage malware, steals passwords, logs keystrokes and can read, write, move and copy files, among other malicious activity, and has stunned the Symantec researchers that detailed it in a report.
Copyright 2015 IDG Communications. ABN 14 001 592 650. All rights reserved.
Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.