This ad will close in 20 seconds. Continue to site »
CW@50: Vint Cerf's 'love affair' with tech
Windows 10 Redstone: A guide to the builds
Excel 2016 cheat sheet
! Here are the latest Insider stories.
For enterprise protection, antivirus software is no longer enough
Read CW’s May digital magazine!
How Veritas is getting its cloud on
Buyers’ Guide: Prices dropping for data visualization software
Suggestions for you
All Cloud Computing
All Computer Hardware
Solid State Drives
Consumerization of IT
All Consumerization of IT
Bring Your Own Device (BYOD)
All Data Center
High-Performance Computing (HPC)
All Emerging Technology
Internet of Things
All Enterprise Applications
Business Intelligence (BI)
Enterprise Resource Planning (ERP)
Software as a Service (SaaS)
Unified Communications (UC)
All IT Management
IT Project Management
IT Skills & Training
Technology Law & Regulation
Mobile & Wireless
All Mobile & Wireless
Mobile Device Management
Windows 10 Mobile
All Operating Systems
Cybercrime & Hacking
Malware & Vulnerabilities
All Vertical IT
Financial Services IT
Small Enterprise IT
Jeremy reports on security and regional news for the IDG News Service.
The Latest from Jeremy
With few options, companies increasingly yield to ransomware demands
The latest Flash zero-day was used to spread Cerber ransomware
The latest zero-day vulnerability in Adobe Systems' Flash player has been used over the past few days to distribute ransomware called Cerber, email security vendor Proofpoint said.
Server software poses soft target for ransomware
An alternate method for infecting computers with ransomware signals a shift in tactics by cybercriminals that could put businesses at greater risk, according to Symantec.
WhatsApp turns on end-to-end encryption
Facebook-owned WhatsApp has strengthened the encryption of its widely used instant messaging app, a development that in theory makes it harder for law enforcement to gain access to communications.
Trump Hotels probes possible payment card breach
The Trump Hotel Collection said on Monday it is working with the Secret Service and FBI to investigate a payment card breach, its second one in less than a year.
CloudFlare aims to block fewer legitimate Tor users
CloudFlare is tweaking its systems to make it easier for legitimate Tor users to access websites that use its content delivery system.
MedStar Health partially restores services after ransomware attack
MedStar Health said Wednesday it is restoring its computer systems following a cyberattack that reportedly involved file-encrypting malware.
CNBC just collected your password and shared it with marketers
CNBC inadvertently exposed peoples' passwords after it ran an article Tuesday that ironically was intended to promote secure password practices.
MedStar Health's network shut down by malware
A large health care provider in the Washington, D.C., area said it has resorted to using paper transactions after malware crippled part of its network early Monday.
Hackers race to compromise POS systems
Cybercriminals are redoubling efforts to steal payment card details from retailers before new defenses are put in place, according to FireEye.
Firmware bug in CCTV software may have given POS hackers a foothold
A researcher with RSA says faulty firmware found in security cameras sold by at least 70 vendors may be a contributor to many of the credit card breaches that have proved costly to retailers.
This bag of tricks may help stop a Locky ransomware infection
A malware researcher has found a few tricks to stop one of the latest types of ransomware, called Locky, from infecting a computer without using any security programs.
Sign up and receive the latest news, reviews and trends on your favorite technology topics.
Get our daily newsletter
6 Discoveries IT Security Pros Need to know about SSL Inspection
How CIOs Gain a Competitive Edge with a Service-centric Enterprise
Top BI Tools for 2017 - Expert Ratings and Pricing - Free Analyst Report
Accelerate Healthcare Transformation and Clinician Workflows with a Secure Digital Workspace
Beyond Perimeter: Detecting Ransomware and Aberrant User Behavior