Tim Greene

Senior Editor

Tim Greene covers security and keeps an eye on Microsoft for Network World.


How to dodge Black Friday and Cyber Monday shopping hackers

How to dodge Black Friday and Cyber Monday shopping hackers

Hackers are writing apps, setting up phony Wi-Fi networks and unleashing malware in attempts to turn legitimate Black Friday and Cyber Monday retailing into profits for themselves, according to security experts.

Attacks to make Ask.com Toolbar a conduit for malware are nipped in the bud

Attacks to make Ask.com Toolbar a conduit for malware are nipped in the bud

Attackers who were trying to turn the Ask.com Toolbar into a malware dispensary got caught early on when their scheme was picked up by security services that were looking for anomalies.

IBM sets up test range to practice fighting nightmare cyber battles safely

IBM sets up test range to practice fighting nightmare cyber battles safely

IBM Security has launched a network-emulation environment where corporate teams can play out attack scenarios so they are better prepared for incidents they might face in the real world.

Akamai: Look for IoT devices to attack during Thanksgiving, Christmas

Akamai: Look for IoT devices to attack during Thanksgiving, Christmas

The annual holiday uptick in denial of service attacks will likely continue this year only this time with a new devastating weapon: Internet of Things (IoT) devices, according to Akamai.

There’s a war on for cybersecurity talent

There’s a war on for cybersecurity talent

Filling cybersecurity jobs is getting so hard managers need to think outside the box if they hope to fill critical positions.

Black Hat Europe: IoT devices can hack phones

Black Hat Europe: IoT devices can hack phones

The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.

ExtraHop package captures files before ransomware encrypts them

ExtraHop package captures files before ransomware encrypts them

ExtraHop is introducing a way to capture files just before ransomware encrypts them, making it possible to restore them but without regularly scheduled comprehensive updates.

Cisco seeks faster time to discovery for breaches, compromises

Cisco seeks faster time to discovery for breaches, compromises

Cisco has announced security upgrades to cut the time compromises go unnoticed on endpoints, giving attackers less time to do damage if they get past preventive security measures.

Gartner: Despite the DDoS attacks, don’t give up on Dyn or DNS service providers

Gartner: Despite the DDoS attacks, don’t give up on Dyn or DNS service providers

The DDoS attacks that flooded Dyn and knocked high-profile Web sites offline don’t mean businesses should abandon DNS service providers, in fact they should use more than one DNS provider for redundancy.

IBM deploys machine learning to bolster online banking security program

IBM deploys machine learning to bolster online banking security program

IBM Security is introducing online banking protection that flags fraudulent account users based on how they move their mouse.

The secret behind the success of Mirai IoT botnets

The secret behind the success of Mirai IoT botnets

IoT devices make good botnet material because they are poorly defended and the Mirai source code to create them has been made public.

Load More