Uncategorized

 

Ransomware rampage takes aim at business targets

sh_ransomware_7502

By Byron Acohido Consumers are no longer the prime target of ransomware campaigns. After years of petty thievery on a global scale – locking up the computer screens of millions of consumers with scams to sell bogus $79 antivirus clean-up services  –  they’ve turned their attention to much bigger fish. The opening quarter of this […]

Why ‘Shadow IT’ must be addressed

shutterstock_274479842

By Byron Acohido By-passing the IT department in to order begin utilizing the hottest new technologies is something tech-savvy employees have been doing since the inception of corporate networks. Most often, these workers aren’t maliciously motivated. They are simply intolerant of plodding decision-making and so take it into their own hands to acquire and begin […]

Why network perimeters need to be redefined in the age of cloud computing

By Byron Acohido The rising business use of cloud services and mobile devices has opened a Pandora’s box of security exposures. Software as a Service (SaaS) tools like Salesforce.com, Gmail, Office 365 and Dropbox, as well as social media sites like Facebook, LinkedIn and Twitter, are all being heavily leveraged by companies large and small […]

Pulitzer Centennial highlights role of journalism

By Byron Acohido Standing on the floor of the Newseum in Washington, D.C., last week, in a crush of hundreds of past recipients of The Pulitzer Prize, was thrilling and humbling. We were assembled for a group photo as part of the yearlong celebration of the Pulitzer’s centennial. It was a chance to reconnect with […]

Anatomy of an attack: Using Twitter to launch denial-of-service attacks against banks

By Byron Acohido (Editor’s note: This actual snapshot of a cutting-edge Distributed Denial of Service attack was discovered by analysts at security vendor Digital Shadows, which provides cyber situational awareness to its SMB and enterprise customers. Digital Shadows’ CTO James Chappell shared this detailed intelligence with LastWatchdog. In the accompanying video, F5 cybersecurity evangelist David […]

Anatomy of an attack: Military hacking tactics used against a retailer

By Byron Acohido (This actual snapshot of a cutting edge cyber attack was discovered by analysts at Norse Corp, a security vendor that  has developed an amazing global network of honeypots emulating all sorts of common workplace and home appliances connected to the Internet, with embedded operating systems rife with vulnerabilities. Norse uses this honeypot […]

Boeing told FAA in secret of 737 rudder hazard before 1994 crash

(Editor’s note: The text of this Page 1A news story is being posted here to make it readily available for future reference. The original copy resides in the Seattle Times archives.) Copyright © 2000 The Seattle Times Company Local News : Tuesday, February 22, 2000 by Byron Acohido Seattle Times staff reporter Boeing knew for […]