Robert Lemos

About

Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

Visa Sued for Fines Stemming from Genesco Data Breach

Specialty sports-apparel retailer Genesco filed a lawsuit on March 7 against Visa seeking to recover nearly $13.3 million in fines that the credit-card company levied following a breach of the retailer’s systems that may have resulted in fraudulent transactions. The civil case could be the most significant test to date of the Payment Card Industry’s […]

Hacktivists Expand Bank DDoS Attacks as Security Pros Monitor Source

Alleged hacktivists again launched denial-of-service attacks against major U.S. banks last week, causing some disruption at a handful of financial institutions. While the group behind the attacks continue to pose as hacktivists, the longevity of the campaign—now entering its sixth month—has some security experts arguing that the attacks are a well-funded operation. On March 5, […]

Java, Adobe Plug-Ins, Browsers All Fail to Survive Pwn2Own Contest

Security researchers claimed nearly $500,000 in bounties for demonstrating previously unknown—or zero-day—attacks against all major browsers and three popular browser plug-ins at the annual Pwn2Own competition at the CanSecWest conference in Vancouver, B.C. The three-day contest, which ends March 8, requires that security professionals play the role of attackers and compromise fully patched versions of […]

Japan, Australia, US Top Nations for Cloud: Study

Nations around the world have made spotty progress on national policies to support cloud computing and digital commerce, with a few standouts, such as Singapore, passing solid privacy and security regulations, according to a survey of 24 countries by the Business Software Alliance. In the “2013 BSA Global Cloud Computing Scorecard,” Asian nations ran the […]

Verizon Reports Illicit Images Scanned in Maryland Man’s Cloud Storage

Police charged a Maryland man on March 1 for allegedly possessing illicit images of children, following a tip from his cloud storage provider Verizon, which had detected the images in an online sweep of its service. William Steven Albaugh, 67, a deacon at St. Joseph’s Roman Catholic Church, was arrested at home, where a search […]

Evernote Cloud Storage Service Warns Users of Password Breach

Online storage service Evernote warned users on March 2 that unknown attackers had compromised its system and gained access to the information on more than 50 million users, including encrypted password files. Evernote moved to assure customers that their data and payment information remained safe, but conducted a password reset for all 50 million users […]

SCADA Security Experts Call for More Public-Private Collaboration

SAN FRANCISCO—Information sharing—or the lack of sharing—has become a prominent point of contention between private corporations and government agencies. The issue is even more of a problem for critical infrastructure providers, control-system experts said at the RSA Conference. While there are hubs of activity around security in critical infrastructure, companies tend not to share vulnerability […]

Reanimating Botnet Domains Delivers Clues to Cold Cases

SAN FRANCISCO — Security researchers and defenders are using increasingly aggressive tactics to put pressure on attackers and make their adversaries’ mistakes more costly. In the latest example, managed security firm Dell Secureworks discovered a successful campaign that stole information from at least four organizations by co-opting the attackers’ command-and-control infrastructure, the firm announced at […]

Security Worker Shortfall Is Putting Organizations at Risk

SAN FRANCISCO—When asked whether their companies had as many information-security workers as they needed, attendees at the Cloud Security Alliance (CSA) Summit here just snorted and laughed. With stolen intellectual property and data breaches regularly making headlines these days, no company or government agency feels that they have the resources they need to secure their […]

Cyber-Attackers Most Often Target Nine Business Apps: Research Report

An analysis of exploit and malware traffic inside corporate networks found that social networks account for few attacks, while 97 percent of exploit traffic focused on 10 applications, nine of which were critical business applications. The analysis of log data from 3,056 companies underscores that internal corporate applications, not multimedia and social-networking applications, are the […]