Paul Korzeniowski

Profile of Paul Korzeniowski

News & Commentary Posts: 23

Paul Korzeniowski is a freelance contributor to InformationWeek who has been examining IT issues for more than two decades. During his career, he has had more than 10,000 articles and 1 million words published. His work has appeared in the Boston Herald, Business 2.0, eSchoolNews, Entrepreneur, Investor's Business Daily, and Newsweek, among other publications. He has expertise in analytics, mobility, cloud computing, security, and videoconferencing. Paul is based in Sudbury, Mass., and can be reached at [email protected]

Articles by Paul Korzeniowski

Verizon Enters Cloud Security Market

Small and medium businesses have been moving their IT infrastructure into the cloud, but one challenge has been determining how to secure such applications. To address such concerns, Verizon Business has developed a new suite of cloud-based security services.

Post a Comment

Is Your Wi-Fi Network Open to Intrusion?

Security has been an ongoing concern among wireless LANs users since their emergence in the middle 1990s. While vendors have worked diligently to close up any holes, new ones seem to emerge on a regular period, and one is now coming to light that could impact many small and medium businesses.

Post a Comment

Option Emerges to Secure Google Android SmartPhones

One of the first signs in growing acceptance of a new technology is an influx of security products. An Israeli startup, DroidSecurity, thinks the time has come for companies to try and secure their Android smartphones, so the company has delivered an anti-malware and physical security package for the device.

Post a Comment

Cisco Says Hackers Going Corporate

Partnerships are usually not something associated with hackers, but a growing number of them are pooling their resources to make their tricks more effective. In addition, the crooks are keeping up on current events and instantly developing new ruses based on them. Those are a few of the findings Cisco outlined in its midyear security report.

Post a Comment

Security Finally a CEO Level Concern

Facing an ongoing threat from hackers and needing to comply with more government regulations have forced many businesses to recognize security as an important corporate initiative. Consequently, companies are increasing their spending on security products as well making it a top management concern.

Post a Comment

Ready For Help From Big Brother?

Cybersecurity is an issue that impacts everyone. The bad guys do not care about whom they hurt as long as they take advantage of someone. So, sentiment is growing for private enterprises and the government to work together against the hooligans.

Post a Comment

Security Market Gets Physical

Historically, enterprise security consisted of putting a deadbolt lock on the front door. Hackers hijinks shifted companies attention to computer system breaches, but recently a sense of dj vu has arisen as corporations are again focusing on physical security.

Post a Comment

Time to Implement Security as a Service?

Software as a Service (SaaS) has been gaining acceptance among small and medium businesses because it eases maintenance and deployment requirements. Having been widely implemented in areas, such as Customer Relationship Management, it is now advancing into the security market.

Post a Comment

New Malware Steals Legitimate Ads

Anti-virus software supplier BitDefender discovered a new Trojan , which hijacks Google text advertisements and replaces them with ads from a different provider. The malware, which BitDefender dubbed Trojan.Qhost.WU, modifies a computers' Hosts file (a local storage for domain name /IP address mappings, which is consulted before

Post a Comment

Hats Off to the Feds

One of the deviants who spend their time writing software to wreak havoc with your companys computers will be spending a long time, as many as 60 years, in jail, thanks to the work of the Federal Bureau of Investigation.

Post a Comment

Hackers Now Preying on Your Sympathy

When tragedy strikes, small and medium businesses as well as individuals often reach into their pockets and help. Unfortunately, that willingness to offer assistance to others in their time of need is turning them into fodder for hackers.

Post a Comment

Shallow Victory for the Federal Government

Whether you realize it or not, John Zuccarini, a notorious scam artist, represents a threat to your online business. His cyberspace businesses illustrate the problems that the government must overcome to make it a safe haven for reputable enterprises.

Post a Comment

Do Not Ask Your Customers for Their Social Security Numbers

Do you want to make potential and existing customers feel secure? If so, one item that you need to avoid is asking them for their social security numbers. A poll by Consumer Reports National Research found that close to nine of every ten Americans want state and federal lawmakers to pass laws restricting the use of Social Security numbers. So if you want consumers coming back and ordering products

Post a Comment

Time to Guard Your Instant Messaging Traffic

One downside with popular IT technologies is they attract unsavory elements. Akonix Systems Inc. , a vendor specializing in instant messaging security products, reported that the number of instant messaging specific viruses doubled from July to August. The change could mean a shift in hacker priorities, so therefore small and medium enterprises need to take a closer look at protecting their IM traffic.

Post a Comment

Ready to Lock Up Your Employees iPods?

If you thought that you had your companys security concerns under control, you may have to think again. The widespread success of Apple's iPod is creating new security concerns for enterprises. Because it is equipped with 1G byte (or more) of memory and includes software to synch with a local PC, the handy little device has become a new entry way for hackers. Chances are that it has become just that at your company; securi

Post a Comment
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
Trump Administration Slaps Sanctions on Russian Hackers, Operatives
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/15/2018
The Case for Integrating Physical Security & Cybersecurity
Paul Kurtz, CEO & Cofounder, TruSTAR Technology,  3/20/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.