Cloud // Cloud Storage
04:26 PM
Alison Diana
Alison Diana
Connect Directly
Repost This

Top 10 Security Stories Of 2010

As smartphones and tablets complement and battle with notebooks and PCs as routes to the connected world, as corporate users and consumers turn to both traditional Web sites and newer social networking sites to communicate, share ideas, trade business concepts, and shop, corporate IT professionals and the government organizations overseeing the nation's cybersecurity are all-too aware they must do more. And they must do it fast. Recognizing this, the federal government hopes to create a new wave
7 of 10

Today's cyber attacks are not a macho game or virtual vandalism. Be it malware or targeted, an attack these days generally has the pursuit of money -- and the power, luxuries, and trappings it provides -- at its core. Attacks such as Aurora, which began in 2009 but dominated the news in early 2010, pursued intellectual property. Other malware attacks seek money, proprietary information such as credit cards and, in the United States, social security numbers, and confidential corporate information and trade secrets. For many hackers, creating havoc-inducing code is a big-number business. Websites listing the results of their ill-gotten gains flourish, and governments have a challenge tracking down these criminals who frequently operate offshore using technologies that make them difficult to pin-down.


Malware Winning Battle Against Antivirus Software

Twitter Worm Spreading Through Google Link

Researchers Remotely Defeat IE Protected Mode

Alureon Malware Bites Windows 7

Facebook Christmas Tree Virus Hoax Spreading

Bredolab Botnet Still Spewing Malware

Java Trojan Bungles Mac Attack

7 of 10
Comment  | 
Print  | 
More Insights
Google in the Enterprise Survey
Google in the Enterprise Survey
There's no doubt Google has made headway into businesses: Just 28 percent discourage or ban use of its productivity ­products, and 69 percent cite Google Apps' good or excellent ­mobility. But progress could still stall: 59 percent of nonusers ­distrust the security of Google's cloud. Its data privacy is an open question, and 37 percent worry about integration.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 - 2014
Our InformationWeek Elite 100 issue -- our 26th ranking of technology innovators -- shines a spotlight on businesses that are succeeding because of their digital strategies. We take a close at look at the top five companies in this year's ranking and the eight winners of our Business Innovation awards, and offer 20 great ideas that you can use in your company. We also provide a ranked list of our Elite 100 innovators.
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.