The Chinese government apparently was behind the massive distributed denial of service attack that took code library GitHub offline for a number of days, beginning March 26, according to a report by the New York Times.
Microsoft's $7 billion acquisition of Nokia's mobile phone business was almost undone by a glass coffee table. That's right, a coffee table.
The New York Times website was rendered unavailable on Tuesday afternoon. The attack was perpetrated against its domain name registrar, Melbourne IT, by "the Syrian Electronic Army, or someone trying very hard to be them," according to Marc Frons, CIO of the New York Times Company.
If the U.S. government moves ahead with an attack on the Syrian government over alleged chemical weapons use, the Syrian Electronic Army is likely to step up its cyberattacks on U.S. websites, warns a cybersecurity expert.
Enigma's platform will break down the barriers that exist between various local, state, federal and institutional search portals.
Finnish mobile phone maker Nokia reported a smaller net loss in the first quarter of 2013, due in part to growth in sales of its Windows Phone-based Lumia smartphones.
In a series of articles that won the 2013 Pulitzer Prize for explanatory reporting this week, the New York Times accused Apple of sidestepping billions of dollars in taxes and ignoring labor abuses and hazardous working conditions at its suppliers' factories.
Data-ism assumes that that everything that can be measured should be measured and that data is a transparent and reliable lens that allows us to filter out emotionalism and ideology. Is it?
Last week's disclosure by The New York Times that Chinese hackers had infiltrated its computer systems offers a sharp lesson in cyber defense. Instead of kicking out the hackers when they were first discovered, the company kept an eye on them long enough to follow their trail.
The months-long Chinese cyberattack on the New York Times has already been widely reported, but the level of detail in the newspaper's own reporting on the incident should be useful to CIOs at other companies facing potential security threats.