Every once in a while a story comes along that gets different reactions from different groups. For IT, the reaction to Sony’s leaked emails was, “Well, yeah, of course that shouldn’t have been put in writing.” For users, it was, “Wait … you mean those weren’t completely private?”
When an end-of-life deadline hits popular products or services, companies usually face one of two options: Upgrade or pay for extended support. But at least one high-ranking executive theorizes that option may not exist for Windows Server 2003 customers.
For two straight days, IT experts have scrambled to undo a massive cyberattack that has locked employees of Sony Pictures out of their work computers. It appears the machines are being held ransom – though little is known about how or who’s doing it.
A serious privilege escalation flaw has been found in all supported versions of Windows. Here’s what it could mean for businesses – and why you need to patch your systems immediately.
All too often, we don’t actually get a look into how companies store and organize their data until there’s a high-profile breach that comes to light. A recent study looks to shed some light on how this crucial IT practice is handled.
One of the biggest challenges that IT faces – more-so than most other fields – is the rapidly changing and shifting focus. Every time you feel like you have a handle on the latest tech trends, something new comes down the pike.
The Federal Communications Commission (FCC) was not impressed with phone carriers’ data security practices. So the agency took the unprecedented step of issuing a fine for the breach: $10 million in total.
Data breaches are scary for any business, so many companies turn to cyberinsurance for a little peace of mind. Just be sure that your insurer will actually have your back in a worst-case scenario. Here’s how an ugly case is playing out in court following a hacker attack.
TrendMicro has discovered and reported on a spearphishing campaign that went after some very high-value targets. What it found could have lessons you can use for protecting your own users.
While companies scramble to protect their systems against hackers, one target is increasingly becoming a popular means of stealing money: the humble land line.