Privacy Advocates vs. The Government: Why CISPA Will Become Law
By Mike Elgan | Article Published April 18, 2012
Public outcry defeated proposed SOPA legislation, yet key support will likely push through an altered form of cybersecurity legislation.
Tags: security, cyber security, SOPA, CISPA
Zeus Trojan Remains Problematic
By Robert McGarvey | Article Published November 03, 2011
First identified in 2007, the Zeus trojan continues to cause problems -- in fact your own machine may be infected with it. What gives this malware such staying power?
Tags: security, cyber security, malware, trojan
U.S. Launches Cyber Attack Detection Program
By - Reuters | Article Published July 08, 2010
Nicknamed "Perfect Citizen," the program will attempt to uncover cyber assaults on private companies and government agencies.
Tags: security, cybersecurity, cyber security, cyber attacks, government IT
China Says Google Never Filed Complaint in Hacking Case
By Kenneth Corbin | Article Published March 08, 2010
Confusion continues to muddle the Google/China saga, with Chinese officials saying they aren't -- and are -- in talks with Google about hacking and censorship allegations.
Tags: security, Google, cyber security, hacking, Internet censorship
Spanish Botnet Could Paralyze Country
By - Reuters | Article Published March 04, 2010
Authorities say Spanish hackers were not aware that the illegal network they created could have taken down an entire country's computer networks.
Tags: cyber security, PC security, botnet, cyberattack, cyber attack
PC Virus Breached 2500 Organizations
By - Reuters | Article Published February 18, 2010
The PC virus is known to have breached almost 75,000 computers globally, claims Internet security firm NetWitness.
Tags: cyber security, virus, cyber attack, viruses
10 Worst Cybersecurity Snafus of 2009
By Lisa Phifer | Article Published February 09, 2010
Hackers, breaches, and malware on the loose. In the year 2009, a stupendous amount of personal data was stolen due to cybersecurity problems.
Tags: security, cyber security, cyber crime, cyber attack, breaches
IT Security Threat: Social Networking
By Larry Barrett | Article Published February 03, 2010
A malware epidemic plaguing social networking sites threatens far more than users' systems the entire enterprise infrastructure may be at risk.
Tags: social networks, social networking, cyber security, IT security, cyber attack
Phishing Ploy Forces Twitter to Reset Passwords
By Larry Barrett | Article Published February 02, 2010
The microblogging site has reset some Twitter users' passwords after a phishing attack attempted to steal their login information.
Tags: Facebook, security, Twitter, cyber security, phishing
IT Managers Gird for Cyber Attacks
By Larry Barrett | Article Published January 29, 2010
Sophisticated cyber attacks are becoming a nearly routine event, causing IT managers a never-ending series of security headaches. A new report details the threats.
Tags: security, IT management, cyber security, IT manager, cyber attack