Tim Greene

Senior Editor

Tim Greene covers security and keeps an eye on Microsoft for Network World.

 Consultant urges never pay ransomware demands

Blockchain can help secure medical devices, improve patient privacy

Blockchain can help secure medical devices, improve patient privacy

If implemented properly, blockchain can help secure medical devices and improve patient privacy, but the key is proper implementation, according to a top security pro at Partners Healthcare.

Double Agent attack can turn antivirus into malware

Double Agent attack can turn antivirus into malware

An attack discovered by Cybellum called Double Agent can take over antivirus software on Windows machines and turn it into malware that encrypts files for ransom, exfiltrates data or formats the hard drives.

Ask.com serves as a conduit for malware - again

Ask.com serves as a conduit for malware - again

Businesses that allow the Ask.com toolbar in their environments might want to rethink that after endpoints equipped with the browser add-on were compromised last November and then again the very next month using pretty much the same...

Pwnie Express eases security remediation with a risk-assessment tool

Pwnie Express eases security remediation with a risk-assessment tool

Pwnie Express is adding a tool called Device Risk Scorecard to its Pulse Serivce that ranks the risks its security service finds on customer networks and makes it easier to remediate them.

Thieves steal Petya ransomware then use it for free

Thieves steal Petya ransomware then use it for free

Crooks are stealing code from the purveyors of Petya ransomware and using it to extort money from innocent victims, stiffing the creators of the malware out of the cut they are supposed to get.

The CIA should help vendors patch the flaws it was exploiting

The CIA should help vendors patch the flaws it was exploiting

The CIA should help fix the flaws it has been exploiting because they have been made public by Wikileaks, and it is in the public interest to stop others from using them for criminal purposes.

Darktrace finds more attacks, cuts response time, saves money for Blackhawk Network

Darktrace finds more attacks, cuts response time, saves money for Blackhawk Network

Blackhawk Network gets better visibility into threats with Darktrace Enterprise Immune System, more productivity out of its security analysts and saves money by getting rid of multiple other security platforms.

Wikileaks’ dump of CIA exploits exposes enterprises to new risks

Wikileaks’ dump of CIA exploits exposes enterprises to new risks

Corporations concerned about the release of thousands of CIA documents detailing hacks against Apple iOS and Mac OSX, Google’s Android, Microsoft’s Windows, Linux and Solaris need to conduct a fresh round of risk assessment that takes...

Palo Alto Networks pays $105M for LightCyber to better detect network attacks

Palo Alto Networks pays $105M for LightCyber to better detect network attacks

Palo Alto Networks has bought LightCyber for its behavioral analytics platform that can speed the time to detect intrusions that have already breached networks and are moving around looking for ways to carry out exploits.

Trend Micro report: Ransomware booming

Trend Micro report: Ransomware booming

The profitability of ransomware made it the top cyber threat last year in two categories: the number of attacks and the amount of money generated for crooks, according to a Trend Micro lookback on data it collected from its customers....

Replace SHA-1. It’s not that hard.

Replace SHA-1. It’s not that hard.

Now that SHA-1 has been broken it’s time for enterprises that have ignored its potential weakness for years to finally act, and it’s not that hard.

Load More