Security // Vulnerabilities & Threats
News & Commentary
Twitter Posts Betray Illness
Thomas Claburn, Editor-at-Large
News
Tweets reveal whether you have influenza, according to Penn State researchers.
By Thomas Claburn Editor-at-Large, 4/14/2014
Comment9 comments  |  Read  |  Post a Comment
Heartbleed: Making The Case For SDN
Lori MacVittie,
Commentary
Software-defined networking technology could help protect against vulnerabilities like Heartbleed. It's time to develop a more mature SDN option.
By Lori MacVittie , 4/10/2014
Comment3 comments  |  Read  |  Post a Comment
Windows XP Plug Pulled: 5 Questions
Michael Endler, Associate Editor, InformationWeek.com
News
After 12 years, Windows XP officially becomes an unsupported OS. Here's what you need to know, from old PCs to dicey ATMs.
By Michael Endler Associate Editor, InformationWeek.com, 4/8/2014
Comment14 comments  |  Read  |  Post a Comment
FTC Privacy Enforcement Power Wins Court Blessing
Thomas Claburn, Editor-at-Large
News
The agency's claim against Wyndham Hotels for poor data security practices has been allowed to proceed.
By Thomas Claburn Editor-at-Large, 4/8/2014
Comment0 comments  |  Read  |  Post a Comment
VMware Touts Virtualization For Datacenter Security
Charles Babcock, Editor At Large, InformationWeek
News
Hypervisor-based security would be like Goldilocks -- "not too hot, not too cold" -- when it comes to halting malware and intruders well inside the enterprise perimeter, say VMware leaders at Interop.
By Charles Babcock Editor At Large, InformationWeek , 4/4/2014
Comment3 comments  |  Read  |  Post a Comment
Federal Agencies Fail To Protect Personal Data
Elena Malykhina, Technology Journalist
News
Government agencies have inconsistently responded to both cyber and non-cyber incidents, a watchdog group says.
By Elena Malykhina Technology Journalist, 4/3/2014
Comment3 comments  |  Read  |  Post a Comment
New DARPA Office Merges Biology And Technology
Elena Malykhina, Technology Journalist
News
The Biological Technologies Office will focus on using neuroscience, sensor design, microsystems, and other technologies for defense purposes.
By Elena Malykhina Technology Journalist, 4/2/2014
Comment4 comments  |  Read  |  Post a Comment
Feds To Improve Threat Information Sharing
William Jackson, Technology Writer
News
Project Interoperability aims to develop and standardize formats for sharing security and threat information among organizations.
By William Jackson Technology Writer, 3/31/2014
Comment3 comments  |  Read  |  Post a Comment
Microsoft Clarifies Email Snooping Policy
Thomas Claburn, Editor-at-Large
News
Microsoft amends its terms of service to stop peeking into customers' emails, even if it suspects they may be stealing from the company.
By Thomas Claburn Editor-at-Large, 3/31/2014
Comment1 Comment  |  Read  |  Post a Comment
Interop 2014: 8 Hot Technologies
Thomas Claburn, Editor-at-Large
News
Interop 2014 kicks off Monday in Las Vegas. Here's a sneak peek of technologies to watch.
By Thomas Claburn Editor-at-Large, 3/29/2014
Comment7 comments  |  Read  |  Post a Comment
Office for iPad: Microsoft Shifts Strategy
Michael Endler, Associate Editor, InformationWeek.com
News
After years of anticipation, Microsoft Office for iPad arrives -- and it's just the beginning of a new push toward apps across all mobile devices, says new CEO Satya Nadella.
By Michael Endler Associate Editor, InformationWeek.com, 3/28/2014
Comment3 comments  |  Read  |  Post a Comment
Cybercrime Black Markets Grow Up
Mathew J. Schwartz,
News
Cybercrime forums selling advanced attacks on demand are outpacing businesses' ability to defend themselves, new study from RAND finds.
By Mathew J. Schwartz , 3/26/2014
Comment1 Comment  |  Read  |  Post a Comment
Outlook Users Face Zero-Day Attack
Mathew J. Schwartz,
News
Simply previewing maliciously crafted RTF documents in Outlook triggers exploit of bug present in Windows and Mac versions of Word, Microsoft warns.
By Mathew J. Schwartz , 3/25/2014
Comment7 comments  |  Read  |  Post a Comment
Cloak App Helps You Avoid Social Contacts
Kristin Burnham, Senior Editor, InformationWeek.com
News
Meet Cloak, the antisocial media app that uses your friends' Instagram and Foursquare location feeds so you can avoid running into them.
By Kristin Burnham Senior Editor, InformationWeek.com, 3/24/2014
Comment11 comments  |  Read  |  Post a Comment
Windows XP: Feds Brace For End Of Support
Elena Malykhina, Technology Journalist
News
Roughly one in ten US government PCs still use Windows XP. They will be more vulnerable to attacks when XP support ends on April 8.
By Elena Malykhina Technology Journalist, 3/24/2014
Comment9 comments  |  Read  |  Post a Comment
Symantec Fires CEO In Surprise Move
Mathew J. Schwartz,
News
Analysts question security and storage giant's turnaround after the board fires its second CEO in two years.
By Mathew J. Schwartz , 3/21/2014
Comment10 comments  |  Read  |  Post a Comment
Will Target Face FTC Probe?
Mathew J. Schwartz,
News
Retailer's security practices remain under scrutiny as regulators ponder FTC investigation. Meanwhile, Sony options rights to Hollywood cyber-thriller based on breach story.
By Mathew J. Schwartz , 3/20/2014
Comment9 comments  |  Read  |  Post a Comment
NSA Records Billions Of Foreign Phone Calls
Wyatt Kash, Editor, InformationWeek Government
News
New disclosures from former NSA contractor Edward Snowden detail the National Security Agency's RETRO system.
By Wyatt Kash Editor, InformationWeek Government, 3/19/2014
Comment14 comments  |  Read  |  Post a Comment
Many Businesses Fail To Disclose Data Breaches
Kelly Jackson Higgins, Senior Editor, Dark Reading
News
Only about 35% of businesses worldwide say they share attack and threat information with others in their industry, even though 77% admit to suffering from a cyberattack.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 3/19/2014
Comment2 comments  |  Read  |  Post a Comment
Linux Takeover Artists Fling 35M Spam Messages Daily
Mathew J. Schwartz,
News
"Operation Windigo" server takeover campaign controls 10,000 hacked servers, launches millions of spam, malware, and drive-by exploit kit attacks per day.
By Mathew J. Schwartz , 3/19/2014
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 - 2014
Our InformationWeek Elite 100 issue -- our 26th ranking of technology innovators -- shines a spotlight on businesses that are succeeding because of their digital strategies. We take a close at look at the top five companies in this year's ranking and the eight winners of our Business Innovation awards, and offer 20 great ideas that you can use in your company. We also provide a ranked list of our Elite 100 innovators.
Security Job #1 For Feds
Security Job #1 For Feds
The 2014 InformationWeek Government IT Priorities Survey shows federal IT pros care about security - it’s rated as very important by 69% of respondents, 30 percentage points ahead of the No. 2 priority, disaster recovery. Will the upcoming NIST cyber-security framework help manage risk?
Steal Our Slides
2014 State of Storage Survey
2014 State of Storage Survey
If you look at vendor financials, the enterprise storage business seems stuck in neutral. Don't believe it.
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.