Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.
Microsoft awarded more than $128,000 in bounties to researchers for finding vulnerabilities in its products, including a whopping $100,000 reward to one researcher for finding a way to get around all of Windows 8’s defenses. The bounties, part of a reward-for-bugs program kicked off by Microsoft in June, were announced this week on Microsoft’s regularly […]
Two separate espionage groups are making highly targeted attacks on the networks of government agencies and private corporations in search of military, political and industrial secrets, according to independent research efforts by Kaspersky Lab and Symantec. One group, in operation since 2011, has compromised hundreds of computer systems at companies and government agencies in Japan, […]
Trade tensions between China and the United States have fueled long-running economic espionage campaigns; the civil war in Syria has resulted in Website defacements by the Syrian Electronic Army; and the rhetoric on the Korean peninsula has led to destructive cyber-attacks on the South. While global conflicts before the Internet era have had no cyber […]
For most companies, blocking a cloud service like Netflix is a no brainer, as it saps both bandwidth and productivity. Yet, IT administrators need to think differently about cloud services to better secure their company and its data, Rajiv Gupta, co-founder and CEO of cloud security firm Skyhigh Networks, told eWEEK. In a study released […]
Using a desktop scanner, a light-sensitive printed circuit board and white wood glue, a group of researchers from the Chaos Computer Club in Germany broke the security of Apple’s TouchID fingerprint sensor, creating a fake fingerprint to unlock Apple’s latest smartphone, the iPhone 5S. The hack, announced on Sept. 21, came less than 48 hours […]
Network breaches have become the top concern for security professionals, replacing worries over a company’s compliance with federal and industry regulations, according to two surveys released in the past week. A survey of 272 security managers and network engineers, titled “What Keeps IT Pros Up at Night” found that 34 percent of respondents worry most […]
A crowdsourced effort to spur interest in breaking Apple’s latest security enhancement to the iPhone—the TouchID fingerprint sensor—has resulted in an ad hoc bounty program that reached nearly $20,000 in less than two days. A series of bantering tweets between security researchers on Sept. 18 evolved into a site, IsTouchIDHackedYet.com, that tracks the individual bounties […]
A professional group of hackers, likely based in China, has infiltrated government agencies, multinational companies and even security firms, using sophisticated tactics and tools, according to a report released by Symantec on Sept. 18. The group, dubbed “Hidden Lynx” by Symantec researchers, has attacked hundreds of organizations since the first signs of their attacks became […]
On Sept. 9, Yahoo became the latest online-services company to release a report on the number of times that governments requested information on the company’s users, following Facebook’s release of its own transparency report in August. The report shows that Yahoo fielded 12,444 requests from the U.S. government in the first half of 2013, releasing […]
Before a company or individual borrows money, they have to undergo a credit check as proof of their financial security. In the future, companies that want to do business with each other may have to show a similar rating that grades their information security. On Sept. 10, security startup BitSight Technologies launched a service that […]