The latest security news, analysis, reviews and feature articles from NetworkWorld.com.
Updated: 3 min 28 sec ago
The source code for the Carberp banking Trojan program is being offered for sale on the underground market at a very affordable price, which could result in additional Carberp-based financial malware being developed in the future, according to researchers from Russian cybercrime investigations firm Group-IB.
The Canadian privacy commissioner and 36 other data protection authorities on Tuesday raised privacy concerns about Google Glass in an open letter to CEO Larry Page.
Quantum Dawn 2 will test institutions' playbooks while also finding more efficient ways to share real-time information
Yahoo has received between 12,000 to 13,000 requests for user data from law enforcement agencies in the U.S. between Dec. 1 and May 31 this year, the company said Monday.
Revelations over the U.S. National Security Agency's Prism surveillance program have much of the general public in uproar, but in terms of the controversy's impact to enterprise IT, some CIOs have measured, albeit watchful reactions.
Europe's top privacy watchdog and the Digital Agenda Commissioner both said Monday that more transparency and trust is needed between the European Union and the United States following the Prism scandal.
Hackers have found a devious new way to disseminate malware: They're using peer-to-peer networks.
Security experts have been saying for years that insiders -- malicious, careless or simply unaware -- are a greater threat to organizations, both public and private, than hackers.
Apple received between 4,000 and 5,000 requests for customer data from U.S. law enforcement between Dec. 1 and May 31, the company said on Monday.
British intelligence agency Government Communications Headquarters (GCHQ) reportedly intercepted the electronic communications of foreign politicians during G20 meetings that took place in London in 2009.
When it comes to data breaches, hackers and organized crime garner most of the headlines, but most data breaches are caused by human errors and system glitches--application failures, inadvertent data dumps, logic errors in data transfer and more. As a result, educating your employees and making sure they're not cutting corners is a big component in preventing data breaches.
Analysts at the U.S. National Security Agency can gain access to the content of U.S. targets' phone calls and email messages without court orders, NSA leaker Edward Snowden said, contradicting denials from U.S. government sources.
Facebook and Microsoft each fielded thousands of requests for user data as part of law enforcement investigations from U.S. authorities in the second half of last year, they said late Friday.
Costs, skepticism dampen participation in Enhanced Cybersecurity Services initiative
Europe's Justice Commission said Friday that she would not sacrifice European citizens' rights for United States' national security.
Oracle is set to release a patch set for Java SE that targets 40 security vulnerabilities.
At least two U.S. mobile operators, T-Mobile US and Verizon Wireless, reportedly do not participate directly in the U.S. National Security Agency's call metadata collection program because of their partial ownership by foreign telecommunication companies.
Issues recommendations, noting existing 'vulnerabilities ... that could directly impact medical devices or hospital network operations'
Go ahead and ask CSOs from the nation's largest banks about the myriad distributed denial-of-service (DDoS) attacks they've experienced in recent months. They're not going to tell you anything.
Last week's disclosure of massive data collection efforts at the U.S. National Security Agency has generated heated debate in the U.S. and across the world about privacy. The NSA is collecting metadata on U.S. residents' phone calls made on Verizon's network and Internet records from nine Web companies, including Facebook, Google and Microsoft, according to reports in the Guardian and The Washington Post newspapers. But intelligence agencies in other countries have similar goals, according to reports, and in some cases there are few details about what data these governments are collecting.