Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
eWEEK.com
Search
eWEEK.com
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Authors Posts by
    Robert Lemos

    Robert Lemos

    Robert Lemos is an award-winning freelance journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

    election hack

    Security Lessons Companies Can Learn From the U.S. Elections

    ROBERT LEMOS - November 4, 2018 0
    The election race for the governorship of the state of Georgia promises to be tight, with current estimates showing that Democrat Stacey Abrams and Republican Brian Kemp are in a statistical dead heat. Unfortunately, Georgia is also one of five states that continue to use fully electronic voting with no verified paper ballot trails, raising the specter that, if...
    ICS attacks

    Five Trends in Attacks on Industrial Control Systems

    ROBERT LEMOS - October 4, 2018 0
    In May, a new modular malware system—dubbed VPNFilter—began running rampant among small and home office-based routers as well as network-attached storage. More than 500,000 devices in 54 countries were infected by the software, according to networking giant Cisco, and what's more—the malware scanned for traffic used in many industrial control systems, known as Modbus.The attack appears to be just...
    Government-Business Cyber Assistance

    Five Ways Government Can Help Businesses Fight Nation-State Attacks

    ROBERT LEMOS - September 5, 2018 0
    Over the past six months, a relatively unsophisticated group of attackers used a variety of remote access Trojans to attempt to grab banking details from companies—a scheme reminiscent of tactics used by cyber-criminals. Yet, these attacks also targeted a number of Russian, Spanish and U.S. government agencies and were more likely the work of nation-state operators, according to an analysis...
    bug finder

    Five Basic Controls Companies Can Implement to Improve Data Hygiene

    ROBERT LEMOS - August 17, 2018 0
    Many companies are failing to implement the most basic security controls to lock down their networks and data, an oversight that leaves them less able to respond to attacks and security incidents.While security hardening guides that prioritize the most basic steps are freely available from the National Institute of Standards and Technology (NIST), the Center for Internet Security (CIS),...
    Containers

    Five Security Defenses Every Containerized Application Needs

    ROBERT LEMOS - July 31, 2018 0
    With the increase in popularity of agile development and DevOps methodologies, containers have taken off as a way to create easily managed and reproducible software components. Attackers have taken notice, however, and attempts to compromise containers are on the rise. When container management firm Sysdig put a cluster of containers online and exposed the application programming interface (API), for example,...
    Blockchain Security

    How Blockchain Can Secure Supply Chains, IoT Devices, and More

    ROBERT LEMOS - July 16, 2018 0
    On July 9, crypto-currency exchange Bancor announced that hackers had compromised one of the company's digital wallets, using the keys to steal about $23.5 million in Ethereum and other digital currencies. The compromise is the latest digital theft of crypto-currencies based on digital tamperproof ledgers, known as blockchains. In Bancor's case, however, the company had a built-in failsafe to claw...
    123...108Page 1 of 108

    MOST POPULAR ARTICLES

    Android

    Samsung Galaxy XCover Pro: Durability for Tough...

    CHRIS PREIMESBERGER - December 5, 2020 0
    Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
    Read more
    Cloud

    Why Data Security Will Face Even Harsher...

    CHRIS PREIMESBERGER - December 1, 2020 0
    Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
    Read more
    Cybersecurity

    How Veritas Is Shining a Light Into...

    EWEEK EDITORS - September 25, 2020 0
    Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
    Read more
    Big Data and Analytics

    How NVIDIA A100 Station Brings Data Center...

    ZEUS KERRAVALA - November 18, 2020 0
    There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
    Read more
    Apple

    Why iPhone 12 Pro Makes Sense for...

    WAYNE RASH - November 26, 2020 0
    If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
    Read more
    eWeek


    Contact Us | About | Sitemap

    Facebook
    Linkedin
    RSS
    Twitter
    Youtube

    Property of TechnologyAdvice.
    Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Info

    © 2020 TechnologyAdvice. All Rights Reserved

    Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

    ×