WAN

WAN | News, how-tos, features, reviews, and videos

Tip

A five-pillar survival guide for an insecure cyber world

Edward Snowden's action demonstrated that an ordinary insider with a U.S. security clearance can intercept and distribute highly confidential information, even in an age of complex technology designed to prevent such action. What...

McAfee research shows sharp rise in malware signed with legitimate digital certificates

Las Vegas -- McAfee research indicates that a steep rise in the amount of malware signed with legitimate digital certificates -- not forged or stolen ones -- is a growing threat that raises the question whether there should be some...

Online drug dealer: Selling on Silk Road is like any other retail site

Mashable recently published a Q&A with an anonymous drug dealer who was operating on Silk Road, the massive online drug marketplace that was shuttered after the FBI arrested its proprietor earlier this week. The interview, which...

Java exploits seen as huge menace so far this year

Java was the most targeted development platform for exploit attacks during the first half of the year, and attacks have increasingly shifted to zero-day vulnerabilities, according to F-Secure's new threat report. "Of the top...

iPhone TouchID fingerprint biometrics broken by German hacker club

The German hacking group Chaos Computer Club says its biometrics hacking team has discovered how to bypass the biometric security of Apple's TouchID fingerprint authentication through a simple method based on a rubbery duplicate of a...

How to protect corporate data from angry ex-employees

The vast majority of employees who leave a company are honest, upstanding corporate citizens. But you never know when someone might leave on bad terms and then attempt to hack back into your corporate systems. Protecting company...

Cybercrooks target SMBs with new types of attacks

As money and corporate information have morphed from hard currency and blueprints to digital files, small and midsized businesses have become the new banks to rob

Gartner security survey: McAfee up, Trend Micro down

A Gartner report about the security software market out today shows that No. 2 ranked McAfee enjoyed the most overall growth last year, Trend Micro slipped but stayed No. 3, and Symantec held onto its top spot with 19.6% of the $19.1...

Why don't risk management programs work?

When the moderator of a panel discussion at the recent RSA conference asked the audience how many thought their risk management programs were successful, only a handful raised their hands. So Network World Editor in Chief John Dix...

Florida's identity-theft rate dwarfs others

Sure, the headline gives away the answer, but if you had been asked to guess which state has the highest rate of reported identity theft you'd likely have chosen Florida: A large population of vulnerable retirees and a generally high...

Tip

Smartphones take center stage in two-factor authentication schemes

We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be...

McAfee rethinks consumer security service delivery

McAfee, part of Intel, today announced a profound shift in how it distributes and prices its consumer security products by introducing LiveSafe, a service that combines anti-malware plus a score of other capabilities, such as...

7 steps to securing Java

Java, the popular OS-independent platform and programming language, runs on just about every kind of electronic device imaginable, including computers, cell phones, printers, TVs, DVDs, home security systems, automated teller...

Cisco gets tough: Details ruggedized switches for harsh environments

Cisco, which wants to expand its clout into the industrial networks used by power-generation utilities to support the electric grid, today announced an expansion of its "smart grid" portfolio with ruggedized and low-latency switches...

ESEA gaming client hijacks GPUs for Bitcoin mining

The co-owner of widely used computer gaming service ESEA has admitted that the company used its client software to mine bitcoins using customers hardware without their knowledge. Some ESEA users say that the unannounced activity...

IT supply-chain security standard aims to prevent counterfeits, tampering

The danger of counterfeit and tampered IT products is well known, and to fight it, the Open Group has published a technical security standard aimed at supply-chain safety. It's anticipated that by year-end there will also be an...

Reddit co-founder calls out Google, Twitter, Facebook over CISPA

A co-founder of social news site Reddit has publicly urged the heads of Twitter, Google and Facebook to support efforts to defeat a controversial cyber security bill currently under consideration in Congress. Alexis Ohanian posted a...

Should U.S. limit China-government influenced IT systems?

New federal restrictions now preclude four U.S. agencies from buying information-technology (IT) systems from manufacturers "owned, directed or subsidized by the People's Republic of China" due to national-security concerns. But is...

Google transfers license for 3LM Android security technology to MDM vendor BoxTone

Brian Reed, BoxTone's chief product officer, said the license for the 3LM security technology for Android had been held by the Motorola division related to mobility that was acquired by Google last year. But now Google has...

Report thumping Army for mobile cyber security efforts yanked off DoD website

A report from the Inspector General of the U.S Department of Defense that's critical of the way the Army has handled mobile-device security has been inexplicably yanked from the IG DoD public website but can still be found in the...

Load More
You Might Also Like