Author

 Paul Korzeniowski

Profile of Paul Korzeniowski

News & Commentary Posts: 23

Paul Korzeniowski is a freelance contributor to InformationWeek who has been examining IT issues for more than two decades. During his career, he has had more than 10,000 articles and 1 million words published. His work has appeared in the Boston Herald, Business 2.0, eSchoolNews, Entrepreneur, Investor's Business Daily, and Newsweek, among other publications. He has expertise in analytics, mobility, cloud computing, security, and videoconferencing. Paul is based in Sudbury, Mass., and can be reached at [email protected]

Articles by Paul Korzeniowski

Verizon Enters Cloud Security Market

5/11/2010
Small and medium businesses have been moving their IT infrastructure into the cloud, but one challenge has been determining how to secure such applications. To address such concerns, Verizon Business has developed a new suite of cloud-based security services.

Post a Comment

Is Your Wi-Fi Network Open to Intrusion?

8/27/2009
Security has been an ongoing concern among wireless LANs users since their emergence in the middle 1990s. While vendors have worked diligently to close up any holes, new ones seem to emerge on a regular period, and one is now coming to light that could impact many small and medium businesses.

Post a Comment

Option Emerges to Secure Google Android SmartPhones

8/19/2009
One of the first signs in growing acceptance of a new technology is an influx of security products. An Israeli startup, DroidSecurity, thinks the time has come for companies to try and secure their Android smartphones, so the company has delivered an anti-malware and physical security package for the device.

Post a Comment

Cisco Says Hackers Going Corporate

7/14/2009
Partnerships are usually not something associated with hackers, but a growing number of them are pooling their resources to make their tricks more effective. In addition, the crooks are keeping up on current events and instantly developing new ruses based on them. Those are a few of the findings Cisco outlined in its midyear security report.

Post a Comment

Security Finally a CEO Level Concern

9/8/2008
Facing an ongoing threat from hackers and needing to comply with more government regulations have forced many businesses to recognize security as an important corporate initiative. Consequently, companies are increasing their spending on security products as well making it a top management concern.

Post a Comment

Ready For Help From Big Brother?

6/2/2008
Cybersecurity is an issue that impacts everyone. The bad guys do not care about whom they hurt as long as they take advantage of someone. So, sentiment is growing for private enterprises and the government to work together against the hooligans.

Post a Comment

Security Market Gets Physical

4/3/2008
Historically, enterprise security consisted of putting a deadbolt lock on the front door. Hackers hijinks shifted companies attention to computer system breaches, but recently a sense of dj vu has arisen as corporations are again focusing on physical security.

Post a Comment

Time to Implement Security as a Service?

1/25/2008
Software as a Service (SaaS) has been gaining acceptance among small and medium businesses because it eases maintenance and deployment requirements. Having been widely implemented in areas, such as Customer Relationship Management, it is now advancing into the security market.

Post a Comment

New Malware Steals Legitimate Ads

12/20/2007
Anti-virus software supplier BitDefender discovered a new Trojan , which hijacks Google text advertisements and replaces them with ads from a different provider. The malware, which BitDefender dubbed Trojan.Qhost.WU, modifies a computers' Hosts file (a local storage for domain name /IP address mappings, which is consulted before

Post a Comment

Hats Off to the Feds

11/15/2007
One of the deviants who spend their time writing software to wreak havoc with your companys computers will be spending a long time, as many as 60 years, in jail, thanks to the work of the Federal Bureau of Investigation.

Post a Comment

Hackers Now Preying on Your Sympathy

11/8/2007
When tragedy strikes, small and medium businesses as well as individuals often reach into their pockets and help. Unfortunately, that willingness to offer assistance to others in their time of need is turning them into fodder for hackers.

Post a Comment

Shallow Victory for the Federal Government

10/25/2007
Whether you realize it or not, John Zuccarini, a notorious scam artist, represents a threat to your online business. His cyberspace businesses illustrate the problems that the government must overcome to make it a safe haven for reputable enterprises.

Post a Comment

Do Not Ask Your Customers for Their Social Security Numbers

9/11/2007
Do you want to make potential and existing customers feel secure? If so, one item that you need to avoid is asking them for their social security numbers. A poll by Consumer Reports National Research found that close to nine of every ten Americans want state and federal lawmakers to pass laws restricting the use of Social Security numbers. So if you want consumers coming back and ordering products

Post a Comment

Time to Guard Your Instant Messaging Traffic

9/6/2007
One downside with popular IT technologies is they attract unsavory elements. Akonix Systems Inc. , a vendor specializing in instant messaging security products, reported that the number of instant messaging specific viruses doubled from July to August. The change could mean a shift in hacker priorities, so therefore small and medium enterprises need to take a closer look at protecting their IM traffic.

Post a Comment

Ready to Lock Up Your Employees iPods?

8/21/2007
If you thought that you had your companys security concerns under control, you may have to think again. The widespread success of Apple's iPod is creating new security concerns for enterprises. Because it is equipped with 1G byte (or more) of memory and includes software to synch with a local PC, the handy little device has become a new entry way for hackers. Chances are that it has become just that at your company; securi

Post a Comment
Game Change: Meet the Mach37 Fall Startups
Ericka Chickowski, Contributing Writer, Dark Reading,  10/18/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.