The latest security news, analysis, reviews and feature articles from NetworkWorld.com.
Updated: 13 min 17 sec ago
The U.S government and two other entities involved in investigations leading to the indictment of the late Internet activist Aaron Swartz have asked a federal court in Boston to redact the names of people involved in the case from documents being sought by Swartz's estate and by some lawmakers.
Dean admits she failed to report additional searches to higher-ups
The U.S. government agency leading an effort to create a voluntary cybersecurity framework for companies operating critical infrastructure wants to hear ideas about what to include in those standards.
Harvard University President Drew Faust has ordered up a review of the university's email privacy polices amid disclosures that a secret search of some deans' email accounts was broader than originally acknowledged.
An online electronics retailer, Bitcoinstore, has had such a successful trial run accepting only bitcoins for payment that it will continue operating.
Effective program needed to secure about 14,000 mobile devices at West Point and Corps of Engineers, Inspector General report says
Number counted on Google Play by Symantec has grown to over 200 published by more than 50 developers
Junksters exploit Search Giant's good name to whitewash malicious messages
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher.
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.
When it comes to education, most people agree, more is better. No one embodies that principle -- at least in regard to IT certifications -- better than Jerry Irvine. CIO of IT consulting firm Prescient Solutions and member of the National Cyber Security Task Force, Irvine holds more than 20 IT certifications, of which at least six are specifically information security-oriented.
Efforts to expedite the adoption of health information exchange in the United States face a bevy of technology, management and financial questions. There are no easy answers, since HIE organizations are as different as the regions, the populations and the healthcare providers they represent. But there are some lessons to be learned.
Telephony denial-of-service attacks on the rise against public and private organizations