As news of the death of Steve Jobs spread around the Internet, the tributes came pouring in Wednesday, crediting Apple's co-founder and chairman with -- more than once -- changing computing as we know it.
Stories by Robert McMillan
The website for the open-source MySQL database was hacked and used to serve malware to visitors Monday.
SAP has agreed to pay just over $US20 million to settle a criminal case brought against its TomorrowNow subsidiary.
Nearly seven months after Intel shelled out $US7.68 billion for antivirus vendor McAfee, the two companies are offering a glimpse of their future.
1. <strong>Nobody's in charge.</strong> "We are Anonymous. We are legion." This cryptic slogan is used by a band of hackers who call themselves Anonymous. Active for nearly a decade now, the group catapulted into prominence in the past year with attacks on PayPal, Visa, HBGary and Sony. Often called a hacking collective, Anonymous is essentially a movement. There is no central authority. From time to time, participants band together to launch "operations," led by a small group of trusted associates. The operation leaders write up orders and invite anyone who is interested to participate. Operations can happen online or in the real world.
Logging in from a Smyrna, Georgia, McDonald's restaurant, a former employee of a US pharmaceutical company was able to wipe out most of the company's computer infrastructure earlier this year.
Jason Cornish, 37, formerly an IT staffer at the US subsidiary of Japanese drug-maker Shionogi, pleaded guilty Tuesday to computer intrusion charges in connection with the attack on February 3, 2011. He wiped out 15 VMware host systems that were running email, order tracking, financial, and other services for the Florham Park, New Jersey, company.
"The Feb 3 attack effectively froze Shionogi's operations for a number of days, leaving company employees unable to ship product, to cut checks, or even to communicate via email," the US Department of Justice said in court filings. Total cost to Shionogi: $800,000.
Cornish had resigned from the company in July 2010 after getting into a dispute with management, but he had been kept on as a consultant for two more months.
Then, in September 2010, the drug-maker laid off Cornish and other employees, but it did a bad job of revoking passwords to the network. One employee, who was Cornish's friend and former boss, allegedly refused to hand over network passwords to company officials and eventually was fired because of this.
Using a Shionogi account, Cornish was able to log into the company's network from a public McDonald's iunternet connection in February and fire up a vSphere VMware management console that he'd secretly installed on the company's network a few weeks earlier.
Using vSphere, he deleted 88 company servers from the VMware host systems, one by one.
Cornish was charged in July. He faces a maximum of 10 years in prison when he's sentenced on November 10. He could not be reached for comment Tuesday. Shionogi did not return messages seeking comment.
Facebook is going to pay hackers to find problems with its website -- just so long as they report them to Facebook's security team first.
The LulzSec hacking group <a href="http://lulzsecurity.com/releases/50%20Days%20of%20Lulz.txt">sailed off into the sunset Saturday,</a> leaving behind a treasure trove of stolen data along with what some antivirus programs identified as a nasty surprise for anyone who downloaded the Torrent file: <a href="https://www.infosecisland.com/blogview/14784-Warning-Original-50-Days-of-Lulz-Payload-is-Infected.html">a Trojan horse program.</a>
Google may owe Oracle nearly as much money in damages as Oracle paid to buy all of Sun Microsystems, according to Oracle's paid expert in the companies' Java intellectual property dispute.
A security researcher who says he's found serious problems with Siemens computers used in power plants and heavy industry is now expecting to go public with his research at the Black Hat security conference in Las Vegas.
In an acknowledgement of the severity of its recent computer compromise, RSA Security said Monday that it will replace SecureID tokens for any customer that asks.
Google has disrupted what it believes to be a targeted phishing campaign aimed at stealing e-mail from government officials, contractors and military personnel.
Computer users seem to be getting better at spotting fake websites that are trying to steal their passwords, but when it comes to mobile phones, the deck is most definitely stacked against them.
Criminals recently spent more than a week siphoning e-mail messages from Hotmail users' accounts, thanks to a programming bug in Microsoft's website.
Microsoft's next version of the Windows operating system, dubbed Windows 8, will debut in 2012, company CEO Steve Ballmer said Monday.
- Technical Analyst, Cybercrime Operations VIC
- Technical Analyst, Cybercrime Operations ACT
- Presales Security Solutions Architect VIC
- SAP FICO Consultant ACT
- Experience / Service Designer ACT
- Data Analysts x3 ACT
- Wintel Engineer QLD
- Project Manager NSW
- Project Manager - Applications ACT
- Infrastructure Project Manager NSW
- Free Whitepaper! Learn how to create an analytics environment that is governed, scalable and self-serve.
- Free Whitepaper! Learn how IT is evolving from producer to enabler, and fostering collaboration around analytics.
- Free Whitepaper! The 5 criteria to help you select the right analytics platform for your organization.