Search Results

Results 1-10 of 10 for Tom Cross

US Toughens Stance on Chinese Cyberspying With 5 Criminal Indictments

"This is a step forward on the long road toward establishing a set of international norms regarding cyberespionage," said Tom Cross, director of security research at Lancope "These prosecutions do send a clear message regarding what sort of behavior the United States views as ...

SPOTLIGHT ON SECURITY

Cybersquatters Prepare for Mischief

"It reminds me of a scene in one of William Gibson's novels in which someone is applying spray-on rust to a brand new bicycle in order to make it look unattractive to thieves," Tom Cross, director of security research at Lancope, told TechNewsWorld Breach Diary...

SPOTLIGHT ON SECURITY

Twitter Bags Encryption Program

"It is not surprising to see state-sponsored malware like Uroburos appearing on networks in Ukraine in the midst of the Crimean crisis," said Tom Cross, director of security research at Lancope. "Malware activity is an integral part of international conflict today." Although m...

SPOTLIGHT ON SECURITY

Biz Brass Kept in Dark About Breaches

"I'm surprised CEOs are not being briefed more frequently about cybersecurity threats," Lancope Security Research Director Tom Cross told TechNewsWorld "The results were worse than we expected," he added....

SPOTLIGHT ON SECURITY

‘Comment Crew’ Back in Action Against US Cybertargets, Says Mandiant

Industrial control systems are ripe targets for hackers, said Tom Cross, director of security for Lancope "It is difficult to fix security flaws with these systems because they aren't designed to be patched and restarted frequently," he told TechNewsWorld....

Millions of Livingsocial Users Now Prime Phishing Targets

It is not just consumers who have to be worried, said Tom Cross, director of security research at Lancope Enterprises should consider the possibility that employees may have used the same password on LivingSocial that they use to access their work email and VPN accounts, he t...

EXPERT ADVICE

Our Terrible, Horrible, No Good, Very Bad Password System

It has been a heck of a year for password/password hash disclosures. In the same week in June, millions of password hashes were disclosed from LinkedIn, eHarmony and Last.fm. And in the same week in July, more than 450,000 usernames and unencrypted passwords were reportedly stolen from Yahoo Voice, while 420,000 password hashes were leaked as a result of an attack on the social networking site, Formspring. These events have drawn a lot of attention to the issue of password security.

Microsoft Wants to Cordon Off Botnet-Infected Computers

Most Web apps are custom developed by contractors hired to design them for company sites, Tom Cross, manager of X-Force Advanced Research with IBM, told TechNewsWorld. The identified problems are only the tip of the iceberg when it comes to app-based vulnerabilities Thus, res...

IBM’s X-Force: No Telling How Many Unpatched Web Threats Are Out There

The majority of Web apps are custom developed, Tom Cross, manager of X-Force Advanced Research with IBM, told TechNewsWorld. This means that they are built by enterprise personnel or built by personnel contracted by enterprises. Because their vulnerabilities may never be publ...

Can SMBs Live Without Mobile Security?

In addition to becoming lost or stolen, a mobile device can be attacked or be the source of an attack, said Tom Cross, manager of IBM Internet security systems in Atlanta. Tools can be run on or through mobile devices into internal corporate systems and networks, he told the ...

How will consumers react to Apple's WWDC 2023 announcements?
Loading ... Loading ...

CRM Buyer Channels