Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.
Antivirus software has gotten a bad rap, even though the programs continue to help protect firms and raise the bar for attackers, according to a report released on March 11 by research firm NSS Labs. The report finds that antivirus software has largely been criticized based on two-decades-old misconceptions. The software running on users’ computers […]
As tensions between Russia and Ukraine continue to heat up, security researchers and political analysts continue to search for signs of cyber-attacks. But while a few attacks have been reported, it’s impossible to credibly assign responsibility. Ukrainian officials reportedly complained last week that a Crimea-based attack had jammed cell phones of government officials in the […]
The critical-infrastructure networks that help run and administer water utilities, power plants and manufacturing are susceptible to a different set of threats than most information-technology systems, making them harder to attack when correctly configured, but also harder to defend against certain types of attacks, according to a group of security experts. While information security managers […]
Web advertising that directs mobile users to malicious download sites has become the leading vector of attacks on mobile devices, according to a report released March 5 by enterprise security firm Blue Coat Systems. Malicious advertisements, or malvertising, has been a favorite method for cyber-criminals to spread programs that compromise victims’ systems, steal information and […]
San Francisco—Manufacturers of the expanding plethora of personal electronics that have embedded software and processors, so-called smart devices, need to make some basic efforts to secure the software or face potential government scrutiny, a representative of the Federal Trade Commission said at the RSA Conference Feb. 28. A growing number of actions taken by the […]
The soaring value of the Bitcoin digital currency has resulted in increasing criminal attention, with more than 100 families of malware now attempting to steal—not only Bitcoins—but more than 40 other crypto-currencies, according to a research report released on Feb. 26 by Dell SecureWorks. So-called crypto-currency stealing malware (CCSM) searches for and steals the wallet […]
SAN FRANCISCO—Security professionals should stop tweeting their outrage concerning the National Security Agency and other attackers who penetrate networks to steal data, and instead do something about the problem, a Juniper executive said in a mid-morning speech at the RSA Conference on Feb. 25. Calling the virtual histrionics of security professionals canceling their appearances at […]
The vast majority of Android and iOS apps show risky behavior, mainly driven by third-party advertising networks, according to two reports on the mobile software ecosystem published this week. In an analysis of the top 100 paid and top 100 free apps on both iOS and Android, security firm Appthority found that free apps continued […]
A research project aimed at detecting cyber-attacks by analyzing the application crash data has borne fruit. The technique, which uses the crash dumps created by the Windows operating system, helped unveil a cyber-crime campaign that targeted retailers, researchers from security firm Websense said on Feb. 19. Using the information created and submitted by Microsoft’s Windows […]
Micro-investing site Kickstarter acknowledged on Feb. 15 that attackers had compromised the company’s systems and accessed users’ personal data, including names, addresses, phone numbers and encrypted passwords. An unnamed law enforcement agency contacted the company on Feb. 12, revealing to the firm that its systems had been breached. In a statement sent to users, Yancey […]