Greg Masters

Send feedback to Greg Masters



Recent articles for Greg Masters

Microsoft critical patch hours away  
Sep 21, 2012 | Comment Now 
Updates to arrive 3AM Saturday.
 
Woman fined $212,000 for sharing 24 music files 
Sep 18, 2012 | Comment Now 
Thomas-Rasset case expected to hit Supreme Court.
 
Hacker McKinnon refuses medical test in extradition proceedings 
 
Carder 'Fortezza' pleads innocent 
Jun 18, 2012 | Comment Now 
Accused of hawking more than 44,000 credit cards.
 
US unveils initiatives to fight botnets   
Jun 4, 2012 | Comment Now 
Industry Botnet Group spearheads work.
 
US, Israel wrote Stuxnet, officials say 
Jun 4, 2012 | Comment Now 
The NSA and Unit 8200 developed the worm to sabotage Iran's nuclear program.
 
Hacker charged after million dollar heist 
Apr 19, 2012 | Comment Now 
Scammers made nine-fold profit in minutes.
 
Oracle to patch 88 vulnerabilities 
Apr 16, 2012 | Comment Now 
Quarterly fix covers hundreds of products.
 
Oracle patches 88 vulnerabilities 
Apr 16, 2012 | Comment Now 
Fixes for Sun, Solaris and MySQL.
 
Hal Tipton, Father of CISSP, dies at 89 
Mar 20, 2012 | Comment Now 
Co-founder of ISC2 and avid volunteer.
 
White House replaces federal CTO 
Mar 14, 2012 | Comment Now 
Internal promotion.
 
Breaches help bend ears of execs 
Mar 2, 2012 | Comment Now 
Make your CEO security savvy.
 
Microsoft to fix Internet Explorer hole 
Feb 13, 2012 | Comment Now 
Patch Tuesday to include nine fixes for 21 vulnerabilities.
 
Israeli hacker posts 18,000 Arab Facebook logins  
Jan 24, 2012 | Comment Now 
Calls for ceasefire in hacking war.
 
Spam now using QR codes 
Jan 12, 2012 | Comment Now 
Targets mobile users.
 
45,000 stolen Facebook logins found 
Jan 6, 2012 | Comment Now 
Ramnit virus variant harvested login credentials to a single server.
 
Yahoo wins $610M spam judgment  
Dec 13, 2011 | Comment Now 
Could be a win in name only.
 
Researchers release Duqu detection kit 
Nov 14, 2011 | Comment Now 
Open source toolkit scours networks for traces of trojan.
 
Duqu detection kit released 
Nov 14, 2011 | Comment Now 
Security pros still needed to monitor results.
 
Mac trojan found hidden in PDF 
Sep 26, 2011 | Comment Now 
Mac malware mimick Windows attack handbook.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 586

Vote