A white paper from German researchers concludes that, with the right planning and tools, the passcodes could be cracked in under a minute.
Defence Minister Peter MacKay has committed $20 million to fund projects aimed at making Canada safer from cyber attacks.
Joshuah Witt, 35, the final member of a Seattle crime ring that combined hacking with old-fashioned breaking-and-entering, has been sentenced to just under eight years in federal prison, federal prosecutors announced Friday.
The Internet Crime Complaint Center (IC3) on Tuesday issued a warning to travelers to be on the lookout for malware on their hotel's wireless connection.
Twitter has joined a short-list of major web brands that have turned on the secure browsing capability, HTTPS, by default.
Securing wireless connectivity for roaming employees is not as simple as instituting corporate policy. It also requires the education of both administrators and end-users -- and some technology help.
In today's mobile world, it's not uncommon to be faced with a multitude of connection types on any given day.
A Maryland security firm has released an open-source tool that can be used to exploit a vulnerability that permits the brute force hacking of wireless routers, connected using the WiFi Protected Setup (WPS) standard, to retrieve passwords.
A computing standard than enables users to easily stand up an encrypted wireless network suffers from a design weakness that could enable attackers to gain router access, according to US-CERT.
As small businesses increase their dependence on the internet, one federal agency is helping to pave the way for them to conduct secure operations.
Three men in their 30s used low- and high-tech means to install malware to steal banking credentials and credit numbers from dozens of businesses, according to federal prosecutors.
Google and the FTC have settled over the internet giant's admitted privacy missteps in its Buzz social networking service.
A federal lawmaker is calling on a number of high-profile websites to adopt a more secure web protocol to prevent wireless hackers from hijacking their users' data.
Google and the state of Connecticut have avoided a potential courtroom showdown after reaching an agreement over the search giant's accidental collection of personal Wi-Fi data. The two parties signed a stipulation Friday that allows them to begin negotiations without having to enforce a subpoena, which was issued in December after Google refused to provide access to its data so an investigation could confirm whether it had gathered private information and the collection's frequency, according to a statement from Connecticut Attorney General George Jepsen. Google now stipulates that it collected "payload data," including URLs of requested pages and emails, from unprotected wireless networks while its Street View cars captured photos for Google Maps and Earth. - DK
The privacy commissioner of Canada, who has led investigations into the data-handling practices of Google and Facebook, offered a keynote Tuesday at SC Congress Canada in Toronto.
A computer researcher has released a plug-in for the Firefox web browser that lets anyone scan open Wi-Fi networks and hijack, for example, Twitter and Facebook accounts.
The criticism being levied at Google for its collection of Wi-Fi data is misguided.
While most people are familiar with traditional Wi-Fi hotspots, organizations must recognize the security ramifications presented by growing numbers of mobile hotspots.
After already being hit with at least three lawsuits over its admitted collection of information from unprotected Wi-Fi networks, Google now is being subject to a multistate investigation into the privacy blunder.
Google this week was hit with a third class-action lawsuit over its collection of information from unprotected Wi-Fi networks.
Surfing the web on an unsecured public connection may soon yield adware, researchers at the University of Calgary have predicted.
In this month's "Five Stages of Employment" column, the author illustrates the things that get her blood boiling when it comes to information security.
The sixth and final U.S. person charged two years ago with breaking into the computer networks at discount retail parent TJX was sentenced Thursday. A U.S. District Court judge in Boston sentenced Damon Patrick Toey, 25, to five years in prison and fined him $100,000. Toey pleaded guilty in September 2008 to wire fraud, credit card fraud and aggravated identity theft. He also is connected to a number of other major heists at retailers and payment processor Heartland Payment Systems. The ring's orchestrator, Albert Gonzalez, was sentenced last month to 20 years in prison. Some of Gonzalez' Eastern European-based co-conspirators remain at large. — DK
A San Francisco-based hacker accused of stealing and then selling hundreds of thousands of credit card numbers must spend 13 years behind bars, a federal judge has ruled.
For the first time, the U.S. House of Representatives will require its staff and members to take part in an annual IT security training program -- one of the mandates under new policy set to take effect next year.
TJX, which announced a then-record data breach in January 2007, has settled with the final four banks suing the discount merchant.
Cisco's wireless LAN platform suffers from a vulnerability that could lead to a "full breach," according to wireless security firm AirMagnet.
Everett, Wash.-based Fluke Networks, which installs, tests, certifies and monitors networks used by enterprises and telecommunications carriers, announced Thursday that is has acquired AirMagnet, provider of wireless LAN security solutions. The deal -- terms of which were not disclosed -- is expected by some industry observers to make Fluke a leader in Wi-Fi testing. Sunnyvale, Calif.-based AirMagnet is best known for its WLAN security and performance management offering. — DK
With a new guidance document, the Payment Card Industry Security Standards Council aims to clarify what retailers must do to secure their Wi-Fi networks.
Sign up to our newsletters
SC Magazine Articles
- Oracle PeopleSoft attack could enable big data breaches
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- Cyber attack on U.S. power grid could rack up $1 trillion in losses, study says
- All smartwatches are vulnerable to attack, finds study
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- Government 'Cybersecurity Sprint' spurs agency authentication measures
- Report: News, entertainment websites serve majority of malvertisements
- UConn School of Engineering cyberintrusion originated in China
- Report delves into RAT videos on YouTube
- Tor Project, Library Freedom Project to establish Tor exit nodes in libraries