Industry News

US National Vulnerability Database Hacked

Thursday, 14 March 2013 14:22

The US government's online catalog of cyber-vulnerabilities has been taken offline – ironically, due to a software vulnerability. The National Institute of Standards and Technology's National Vulnerability Database's (NVD) public-facing website and other services have been offline since Friday due to a malware infection on two web servers, it emerged on Wednesday.

High Definition Surveillance Solutions

Tuesday, 15 January 2013 17:53

I’ve always wondered what my cat did while I was away from home. Did she devour the leaves of the plant in the living room or merely nibble them? How often did she jump up on the kitchen counter to forage for food? Did she dash out through the open window to patrol the ledge from four stories up?

Plenty of video monitoring cameras offer home surveillance solutions, but they are either expensive or the video resolution is low. At $150, the Dropcam HD aims to hit the middle ground, serving as a decent child monitor or home security camera. As I was getting ready to head out of town on vacation, I was eager to try it out.

Last week's terrorist attacks on the United States are expected to shift government and legislative priorities on a host of technology issues. Internet privacy, for instance, the top technology policy issue barely more than a week ago, will likely be replaced by critical-infrastructure protection as the United States seeks to retaliate against what President Bush has called "an act of war." What this means is that pending legislation to protect corporate data about security incidents, voluntarily shared with the government, will likely be fast-tracked. Antispam legislation, on the other hand, may get pushed aside, according to officials at trade and privacy groups, as well as congressional sources.

Cyber-Criminals Eye Olympic Gold

Thursday, 10 January 2013 17:30

By Taylor Armerding

August 08, 2012 — CSO — The public's appetite for scandal around the world is practically insatiable. Not surprisingly, cybercriminals try to take advantage of it, especially during an event like the 2012 Olympic Games.

But the good news, say experts, is that the bulk of the scams are unsophisticated, looking to take advantage of so-called "low-hanging fruit."

Hackers Infiltrate New York Times

Thursday, 10 January 2013 16:56

From The New York Times

SAN FRANCISCO — For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and After surreptitiously tracking the intruders to study their movements and help erect better defenses to block them, The Times and computer security experts have expelled the attackers and kept them from breaking back in.

The timing of the attacks coincided with the reporting for a Times investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings.

News Feed