9 Notorious Hackers Of 2013
This year's hacking hall of shame includes members of Anonymous and the Blackhole cybercrime gang, plus state-sponsored groups.
Iris Scans: Security Technology In Action
Iris-based security scans are the stuff of sci-fi movies, but NIST research shows how the technology can now be used in the real world to reliably identify individuals.
10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.
Slide Show: 10 Password Database Fails
Evernote's most recent password breach is the same refrain from a song the industry has been singing for a while -- check out some of the worst password cache compromises
Spy Tech: 10 CIA-Backed Investments
Check out some of the latest technologies to win funding from In-Q-Tel, the venture investment arm of the CIA and other intelligence agencies. That's the first step toward use by agents and analysts.
Who Is Hacking U.S. Banks? 8 Facts
Hackers have labeled the bank website disruptions as grassroots-level reprisal for an anti-Islamic film. But is the Iranian government really backing the attacks?
14 Amazing DARPA Technologies On Tap
Go inside the labs of the Defense Advanced Research Projects Agency for a look at some of the most intriguing technologies they're developing in computing, electronics, communications, and more.
Slide Show: 10 Free Database Security Tools
While many database protection suites are an expensive proposition, there are a number of free tools available to organizations seeking cost-effective ways to begin securing their databases
Facebook's History: From Dorm To IPO Darling
Facebook's IPO brings the world's most popular social network into Wall Street's big league. After a wild ride, Facebook's future depends on profiting from an increasingly mobile user base.
Who Is Anonymous: 10 Key Facts
Anonymous 'hacktivists' aim to expose what they call government and establishment hypocrisy. Take a closer look at the group, its offshoots, and its infamous attacks.
7 Tools To Tighten Healthcare Data Security
Most of the largest healthcare data security and privacy breaches have involved lost or stolen mobile computing devices. Consider these tools and tips for protecting patient data and managing breaches.
Ten Big Breaches In 2011
No one was immune: not social networks, not financial institutions, and not even security firms
Slide Show: Sights And Sounds Of Black Hat USA 2011
Zombies, robots, 'war-flying' drones, PWN phones -- and scary, real-world SCADA hacks were among the mix of lighthearted and deadly serious demonstrations and presentations at this year's Black Hat USA in Las Vegas
10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit
5 Airport Body Scanner Patents Stripped Down
Here's a deep dive on five patents applying X-ray backscatter technology to airport contraband detection. These screening machines have been much in the news recently, amid controversy regarding both their effectiveness and the amount of radiation exposure to which travelers are subjected. The patents we'll look at are from prime players in the airport body scanner field. This list is led by Rapiscan Systems Inc. , of Torrance, Calif., which in 2009 won the TSA contract to supply whole-body imag
How Firesheep Can Hijack Web Sessions
Firesheep is a Firefox extension used to hijack web sessions, usually used over WiFi networks. Firesheep doesn't steal usernames and passwords, instead it copies session cookies used on authenticated websites. These are then used to impersonate the hijacked connection. Session hijacking, or sidejacking is a well known problem, ranking 3rd on OWASP's (Open Web Application Security Project) Top 10 Application Security Risk list. Attackers using Firesheep just need access to network traffic -- such
Inside DHS' Classified Cyber Coordination Headquarters
The Department of Homeland Security recently brought its classified National Cybersecurity and Communications Integration Center down to an unclassified level for one day only, and InformationWeek Government was there to take photos. The facility looks and functions like a state-of-the-art network operations center and much more. The NCCIC, as it's called, is the locus of DHS-led inter-agency cybersecurity work in the federal government. That includes providing an integrated response to cyber th
Strategic Security Survey: Global Threat, Local Pain
Highlights of exclusive InformationWeek Analytics research as it appears in "Global Threat, Local Pain," our report assessing whether the high-profile infiltration of corporate networks worldwide (Google China leaps to mind) is forcing execs to reconsider their security strategies and pony up related resources.