= Member Content
ALL security Stories
Microsoft IE Attack Bypasses Key Security Measures
Microsoft releases temporary fix for Internet Explorer zero-day attack.
7 Enterprise Mobility Predictions For 2013
Smartphones and tablets fueled the rise of BYOD in 2012, but better management of those devices is top of mind in 2013.
CTIA To Merge U.S. Trade Shows In 2014
U.S. mobile and wireless industry's main lobbying group will combine its two yearly shows into one larger event in a bid to remain relevant.
Rethinking IT Security Architecture
Experts question the wisdom of current 'layered' cyberdefense strategies as attacks become more sophisticated and breaches abound.
10 Biggest Information Security Stories Of 2012
From John McAfee's escape from Belize to the privacy debacle that compromised CIA director Petraeus' career, 2012 had no shortage of security...
Windows 8 Security Stresses Exploit Prevention
Here's a look at some of the key security features in the Microsoft's new OS.
7 Top Information Security Trends For 2013
From sandboxing enterprise apps on mobile devices to hacking websites via high-bandwidth cloud attacks, experts detail the security trends they...
Google Privacy Convictions Overturned By Italian Court
Three Google executives had been convicted of violating Italian privacy law after a video of a boy being bullied was uploaded to Google Video.
9 Ways Hacktivists Shocked The World In 2012
Despite the arrests of alleged LulzSec and Anonymous ringleaders, ongoing attacks -- including Muslim hackers disrupting U.S. banks -- prove...
Forensic Tool Cracks BitLocker, PGP, TrueCrypt Containers
ElcomSoft's Forensic Disk Decryptor uses PC memory dumps to crack passwords associated with BitLocker, PGP and TrueCrypt archives.
BestBuy.Com Chief Leaves For Symantec
Former Starbucks CIO and 2011 InformationWeek Chief of The Year Stephen Gillett heads to Silicon Valley.
Anonymous Continues Westboro Church Attacks
Hacktivist collective Anonymous gets help with attacks against Westboro Baptist Church, which pledged to picket funerals of shooting victims in...
12 Gifts For The End Of The World
Some believe the world will end on December 21, 2012; NASA insists it won't. We've assembled a list of a few useful tools for any outcome.
Attack Turns Android Devices Into Spam-Spewing Botnets
Beware Trojan app sending 500,000 spam SMS messages per day, charging messages to smartphone owners.
London Firefighters Pursue Twitter Monitoring
London Fire Brigade moves to allow people to summon rescuers via Twitter, parallels "text to 911" efforts in the United States.
Anonymous Posts Westboro Church Members' Personal Information
Anonymous and other hackers have launched DDoS attacks and leaked personal information about group that promised to protest funerals of victims...
Europe Weighs New Data Breach Rules For Critical Companies
Mobile networks, banks, energy companies and other critical infrastructure providers could be required to report all breaches to EU authorities.
5 Notorious Insider Attacks Of 2012
From the recent theft of counterterrorism data from Switzerland's intelligence agency to remotely wiretapping boardroom videoconferencing systems,...
Mandatory Car 'Black Boxes' Proposed: Privacy Questions
NHTSA proposes that beginning in 2014, most cars would have to be fitted with data recorders. Consumer rights advocates say the measure includes...
Britain Declines To Prosecute Alleged NASA Hacker
After 10-year legal battle for allegedly hacking U.S. government computers in search of information on UFOs, British hacker Gary McKinnon is free.
Bromium Secures Older PCs, Terminals Via 'Microvisor'
CTO Simon Crosby says goal is to isolate untrusted tasks on Windows XP machines, thin clients as users bring outside code and content inside the...
How U.K. Police Busted Anonymous Suspect
Operation Payback operators' identities unearthed largely through "social leakage" -- highlighting differences between U.S. and British hacker...
Ransomware, Social Scams Lead 2013 SMB Security Fears
Expect the bad guys to spend more time pursuing small and midsize business (SMB) targets on mobile, cloud, and social platforms, Symantec says.
Bank Attackers Used PHP Websites As Launch Pads
WordPress sites with outdated TimThumb plug-in were among PHP-based sites hackers used to launch this fall's massive DDoS attacks, reports Arbor...
Facebook's New Privacy Policies: The Good News
More granular controls should help reduce "accidental privacy issues."
Resource Links
Related Webcasts
This Week's Issue
Free Print Subscription
SubscribeCurrent Government Issue
In this issue:
Subscribe Now
- Data Center Optimization: Federal agencies must increase server utilization and energy efficiency as they squeeze more computer processing into fewer data centers. We explore how the Army, Homeland Security, Veterans Affairs and others are doing that.
- Future Cities: The world's urban centers are growing, creating a civic management challenge of unprecedented scope and complexity. Our exclusive survey reveals the opportunities and challenges for city planners and municipal IT pros.
- Read the Current Issue










