Here are 20 of the most notorious known break-ins over the past decade.
Stories by Ellen Messmer
The willingness to invest in new security start-ups is continuing at such a breakneck pace that start-ups still in stealth mode are getting snapped up by more established players before they even publicly introduce their security products and services.
Malware often does strange things, but this one -- which looked like Skype installed on a corporate domain controller -- was most "peculiar," says Jim Butterworth, a security expert at ManTech International, whose security subsidiary HBGary recently found the custom-designed remote-access Trojan on a customer's network.
A year ago, Mandiant, since acquired by FireEye, issued a long report called "APT1" that accused China's People's Liberation Army of launching cyber-espionage attacks against 141 companies in 20 industries through a group known as "PLA Unit 61398" operating mainly from Shanghai.
Two recently-discovered flaws in Apple iOS and Mac OS X have security experts openly asking whether the software vulnerabilities represent backdoors inserted for purposes of cyber-espionage. There's no clear answer so far, but it just shows that anxiety about state-sponsored surveillance is running high.
Check Point Software Technologies today said it is extending its security architecture to be able to incorporate more threat-intelligence data that could be shared with other vendor partners, with the goal of providing more adaptive prevention.
Our roundup of new security products on hand at this week's show.
It's not just revenues and size, influence counts and excellence matters.
To ward off cyber-crooks trying to break into customers' accounts, banks are expanding their security efforts beyond desktops and onto iPhones and other mobile devices.
What ever happened to the "FIDO Alliance," that industry group that first showed up a year ago saying it was going to revolutionize e-commerce online authentication by promoting a new multi-factor authentication protocol? Turns out the revolution in security is slow in coming but they're making some progress.
It's already been a prolific year for new IT security companies, and now Bitglass, Spikes Security and Cybereason are making their debuts this month.
Payments made with mobile devices such as smartphones and tablets rose 55% over last year, reaching a total of 19.5% of all transactions processed worldwide in December by Amsterdam's Adyen.
Who do you trust? That's a question asked increasingly by a security industry with a growing sense that the National Security Agency (NSA) has sought to weaken encryption or get backdoors into computers, based on documents leaked by Edward Snowden to the media. Now, trust is also the theme of a new conference called TrustyCon that will vie for attention on Feb. 27 in San Francisco while the big RSA Conference for security pros is also taking place in that city.
Start-up Confer recently debuted with software and services aimed at detecting stealthy malware and attackers targeting enterprise servers, laptops and mobile devices. Though market competition is fierce, Confer believes it can win through its application behavior-analysis approach and its cloud-managed threat-intelligence platform that makes use of the open protocol called STIX.
Backed by a lineup of elite investors, start-up Shape Security comes out of stealth mode today by announcing technology it calls Shapeshifter that is said to prevent cyber-criminals from successfully attacking and compromising websites.
Nominations Close on June 12
VIRTUAL EVENT - Thursday, June 18 - Registrations Open