security: Vulnerabilities and threats
S.C. Security Blunders Show Why States Get Hacked
Governor blames data breach on Russian hackers and the IRS, but states' by-the-book IT ethos shows rules and regulations are the real culprit.
Royal Security Fail: 'May I Speak To Kate?'
The oldest -- and most effective -- social engineering trick in the book remains getting on the phone and impersonating an insider. Ask Kate...
Social Networks Continue Push For Control
The Internet was supposed to facilitate direct connections between individuals and disempower gatekeepers. Instead, it has become a massive...
Should LulzSec Suspect Face Life In Prison?
Computer hacking, identity theft, and fraudulent credit card charges could add up to 30 years to life for alleged Stratfor hacker Jeremy Hammond.
Facebook 'Privacy Notice' Has No Legs
But Facebook should be looking at why the notice went viral.
Petraeus Mission Impossible: Cloaking Email, Online Identities
So-called security experts making basic information security errors isn't a new occurrence. Arguably, it even led to the rise of the Anonymous...
The Petraeus Affair: Surveillance State Stopper?
Lawmakers, now reminded of their own vulnerability, need to strengthen email privacy protections. Companies need to do more to help customers...
5 Items Should Top Obama's Technology Agenda
From infrastructure to tech education, here's what I want to see on the to-do list for the next four years.
5 Emerging Enterprise Technologies
If you are not watching these developments, your business is missing out. Here's what Gartner's annual top 10 tech trends list missed.
Frankenstory: Attack Of The Iranian Cyber Warriors
Citing no hard evidence, U.S. government officials have been stoking fears that the Iranians are out to get us.
Security Newsletter Sign Up
Get timely, actionable insights tailored to the topics you are interested in.
Sign UpTop Stories
-
Microsoft IE Attack Bypasses Key Security Measures
January 03, 2013Microsoft releases temporary fix for Internet Explorer zero-day attack.
-
10 Biggest Information Security Stories Of 2012
December 28, 2012From John McAfee's escape from Belize to the privacy debacle that compromised CIA director Petraeus' career, 2012 had no shortage of security...
-
Windows 8 Security Stresses Exploit Prevention
December 27, 2012Here's a look at some of the key security features in the Microsoft's new OS.
-
7 Top Information Security Trends For 2013
December 27, 2012From sandboxing enterprise apps on mobile devices to hacking websites via high-bandwidth cloud attacks, experts detail the security trends they...
-
9 Ways Hacktivists Shocked The World In 2012
December 21, 2012Despite the arrests of alleged LulzSec and Anonymous ringleaders, ongoing attacks -- including Muslim hackers disrupting U.S. banks -- prove...
-
Anonymous Continues Westboro Church Attacks
December 20, 2012Hacktivist collective Anonymous gets help with attacks against Westboro Baptist Church, which pledged to picket funerals of shooting victims in...
-
12 Gifts For The End Of The World
December 20, 2012Some believe the world will end on December 21, 2012; NASA insists it won't. We've assembled a list of a few useful tools for any outcome.
-
Attack Turns Android Devices Into Spam-Spewing Botnets
December 19, 2012Beware Trojan app sending 500,000 spam SMS messages per day, charging messages to smartphone owners.
-
Anonymous Posts Westboro Church Members' Personal Information
December 18, 2012Anonymous and other hackers have launched DDoS attacks and leaked personal information about group that promised to protest funerals of victims...
-
Europe Weighs New Data Breach Rules For Critical Companies
December 18, 2012Mobile networks, banks, energy companies and other critical infrastructure providers could be required to report all breaches to EU authorities.
More
News »
Slideshows
Resource Links
Related Webcasts
This Week's Issue
Free Print Subscription
SubscribeCurrent Government Issue
- Data Center Optimization: Federal agencies must increase server utilization and energy efficiency as they squeeze more computer processing into fewer data centers. We explore how the Army, Homeland Security, Veterans Affairs and others are doing that.
- Future Cities: The world's urban centers are growing, creating a civic management challenge of unprecedented scope and complexity. Our exclusive survey reveals the opportunities and challenges for city planners and municipal IT pros.
- Read the Current Issue












