We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

More Security Articles

  • News: Banks warned on mobile security

    A lack of IT and business integration is opening up banks and their customers to attacks through mobile malware, according to an IDC research paper.

  • News: Reddit to go dark in SOPA protest

    Social news site Reddit will black out its site for 12 hours on January 18 to protest the controversial Stop Online Piracy Act SOPA bill that is currently working its way through the U.S. House of Representatives.

  • News: Microsoft Planning Real-Time Feed of Valuable Threat Data

    Microsoft has had a great deal of success taking down botnets in recent years. A fringe benefit of those takedowns is that Microsoft gets to collect oodles of very valuable data. Now, Microsoft is preparing to offer that threat intelligence as a real-time feed that partners can use to evaluate threats and develop better defenses.

  • News: Cisco sending enterprises to the cloud

    In an effort to accommodate enterprise users looking to implement private and hybrid clouds, Cisco in the coming months will unveil an "integrated" WAN routing system of existing, but enhanced, products.

  • News: Lawmakers seek hearing on Carrier IQ privacy issues

    Three House members today called for a Congressional hearing on the implications raised by the use of the Carrier IQ's software by wireless carriers.

  • News: Managing information security during an innovation void

    Although predictions for the coming year are a staple of the season, I will do more than offer an educated guess. I am going on the record with a guarantee: In 2012 we will see an increase in network intrusions from disparate parties trying to create IT infrastructure chaos for a variety of reasons primarily political, financial and economic. An easy prediction perhaps given the trend and yet while I fully trust CSOs and CISOs and security teams are doing all they can to prevent breaches; I am deeply concerned that they still lack the technology to adequately protect IT infrastructure from malicious attacks.

  • News: How a Baptist pastor in Florida became the go-to IT guy

    As a Baptist pastor, Terrill Gilley says his work calls for him to help worshippers and provide support to the senior pastor at his Florida church located in a rural area outside Orlando. And oh, he's also the network administrator for the church and the school it established.

  • News: IBM software eases role-based security operations

    IBM this week announced an identity-management analytics tool that eases what can be a tedious job for information-technology managers -- defining roles for employees in order to establish policy-based access to a network and application resources.

  • News: Microsoft to launch real-time threat intelligence feed

    Microsoft is looking to share its wealth of security information with the world through a new real-time threat intelligence feed, the company recently announced at the International Conference on Cyber Security in New York.

  • News: Anonymous publishes Israeli SCADA log-in details

    A member of the Anonymous hacktivist collective has published a list of Internet-facing Israeli SCADA (supervisory control and data acquisition) systems and alleged log-in details.

  • Opinion: Malware Destroyed My Data

    Malware infected Jazzy007's PC, and his data disappeared--even after he removed the culprit. He asked the Answer Line forum for help.

  • News: 4 Google Social Search Tips for Control and Privacy

    Google sparked controversy on Tuesday with the announcement of a major search update that includes content from its budding social network, the announcement posted on Google's blog, Google Fellow Amit Singhal says, "Search is still limited to a universe of webpages created publicly, mostly by people you've never met. Today, we're changing that by bringing your world, rich with people and information, into search."

  • News: Hash collision DoS vulnerability fixed in PHP 5.3.9

    The PHP development team has released version 5.3.9 of the popular Web development platform in order to address a recently disclosed denial-of-service (DoS) vulnerability, as well as other security issues and bugs.

  • How-Tos: How to adjust UAC settings in Windows 7

    User Account Control (UAC) was a feature first introduced by Microsoft in Windows Vista.

  • News: Twitter lagging behind in protecting users against child abuse

    Twitter is lagging behind other social networks when it comes to removing users that post child abuse images.

  • News: Swiss bank chief Hildebrand's private emails revealed, fuelling scandal

    Philipp Hildebrand, who resigned two days ago as chairman of the Swiss National Bank in the midst of an alleged insider trading storm, is facing up to conflicting accounts of events in a tranche of his private emails released by the bank.

  • News: Stratfor relaunches site; CEO accuses attackers of censorship

    Strafor Global Intelligence CEO George Friedman on Wednesday blasted those responsible for a December attack on the global intelligence firm's website and decried what he called 'censorship' by the attackers.

  • News: Symantec employs scareware sales tactics, lawsuit charges

    A Washington man on Tuesday sued Symantec in federal court, accusing it of using the same tactics as fake "scareware" software to sell its PC cleanup utilities.

  • News: Samsung Galaxy Devices Get Important Security Clearance

    Samsung has just received Federal Information Processing Standard (FIPS) approval for the Samsung Galaxy Tab 10.1 Wi-Fi, the 4G LTE-enabled Galaxy Tab 10.1 with Verizon, and the global version of the Galaxy S II smartphone.

  • News: Can you trust data-recovery service providers?

    Data-recovery service providers are supposed to be saving important data for you when something goes wrong -- a drive crashes or storage device is dropped, and no backup is available. But do you trust them with the important data you let them recover or could they actually be a source for a data breach?



IDG UK Sites

Samsung Galaxy Note 4 review: Great if you like big, expensive phones

IDG UK Sites

Why Sony's PS4 2.0 update is every gamer's dream (well, mine at least)

IDG UK Sites

This Grolsch ad combines stop-motion & CG for majestic results

IDG UK Sites

Apple rumours and predictions for 2015: What to expect from Apple in 2015