We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

More Security Articles

  • News: Fragmented AJAX-based Web exploitation attacks detected in the wild

    Security researchers from Web filtering vendor M86 Security have detected Web exploitation attacks that use AJAX (Asynchronous JavaScript and XML) to fragment the payload into small pieces of code that are harder to detect by antivirus programs and intrusion prevention systems.

  • News: Norton plans iPhone, iPad security software

    Norton's Con Mallon today told PC Advisor that although its mobile security focus was currently on Android, the company was looking to expand into different mobile operating systems, offering different features and functions. Mallon said that a Norton iOS security product could even happen in the next 12 months.

  • Opinion: The Cloud, Day 21: My Data Might Be Safer in the Cloud

    Yesterday I talked about my concerns about the security of my data if I store it in the cloud. It seems like an awful lot of faith to put in a third-party to expect it to protect my data. However, there is a flip side to that coin that suggests that maybe my data is better off in their hands than mine.

  • News: Norton: Mobile threat 'immature'

    Norton's Con Mallon today told PC Advisor that in the mobile space: "Threats are still relatively immature, in both sophistication and quantity."

  • News: Facebook Timeline Scams Prey on Wishful Thinking

    If you're not a fan of Facebook's new Timeline, you're not alone. In a CIO.com poll of more than 600 people, 87 percent responded that they dislike the new profile design.

  • News: Anatomy of an ATM Skimmer Scam

    You may already know that it’s important to protect your financial information when you shop online. But a high-tech threat can steal your credit card information when you’re out shopping around town. Scammers can steal your ATM or credit card information without your even noticing, and the technology behind their tricks is getting more and more advanced.

  • News: Researcher devises hard-to-detect denial-of-service attack against HTTP servers

    Qualys senior software engineer Sergey Shekyan has devised a new HTTP denial-of-service (DoS) attack method which relies on prolonging the time clients need to read Web server responses.

  • News: Government engineers actively plan for cyberwar

    Governments are arming themselves to their cyber-teeth with offensive and counter-defense cyber weapons, and there's little enterprises can do to avoid the fray.

  • News: Microsoft researcher: Passwords aren't dead but they need fixing

    Password use needs an overhaul that is driven not by guesswork but by actually understanding the real damage that can be done when password security is compromised, according to a Microsoft researcher.

  • News: Anonymous Targets Neo-Nazis Sites: Anti-Hate Groups Condemn Action

    A new website launched by the hacker collective known as Anonymous is targeting the neo-Nazi movement in Germany.

  • News: Check Point supports cloud security for Amazon Web Services

    Check Point and Amazon Web Services are teaming up to enable Check Point Security Gateway functionality to boost cloud security for business assets.

  • News: Two new security books ponder: Just how vulnerable are we?

    Two recently-published books, "America the Vulnerable" by Joel Brenner, a former official at the National Security Agency (NSA) and "When Gadgets Betray Us," by writer and security analyst Robert Vamosi, have one theme in common: We've come to depend on modern networks and technology, but the compromise of them by attackers is a serious threat to both individuals and society as a whole.

  • News: Smart Grid Security Inadequate, Threats Abound

    Near chaos. That's the current state of security for smart grids, according to Pike Research. A recent report by the research firm finds that a lack of security standards, a hodgepodge of products and increasingly aggressive malicious hackers will make 2012 a challenging year for securing smart grids. (A smart grid uses IT and smart meters in an effort to make electric utilities more efficient, reliable and sustainable.)

  • News: Tips from IT professionals on how to handle virtual desktops, wireless, network performance issues

    Schools are for learning, and the information technology and security professionals who support networks and applications in the nation's K-12 and university systems are discovering new tactics in what can be challenging IT environments. Here we talk to four professionals in the education realm to get a sense for their top IT issues and what they do to handle them.

  • News: Social network for activists resets 18 million passwords following a security breach

    Care2.com, a social networking website for activists, has decided to reset the account passwords of almost 18 million registered members after hackers gained access to its servers.

  • News: SpyEye malware borrows Zeus trick to mask fraud

    A powerful bank-fraud software program, SpyEye, has been seen with a feature designed to keep victims in the dark long after fraud has taken place, according to security vendor Trusteer.

  • News: Crysis 2 most pirated PC game of 2011

    Crysis 2 was the most pirated PC game of 2011, according to figures from Torrent Freak.

  • News: Murder retrial ordered after court records destroyed by virus

    A convicted murderer has been granted a retrial after a stenographer’s backup record of his trial was apparently destroyed by a malware infection.

  • News: Anonymous Threatens Sony, Spares PSN Customers

    The loosely organized hacker group known as Anonymous has Sony in its sights once again. After releasing a video a few days ago wherein they threaten to destroy Sony’s network, the group, which has been organizing in the IRC channel #OpSony, has clarified the meaning of their declaration. Unlike the infamous PlayStation Network hack of 2011, the target of this attack is not Sony’s customers or even the Playstation Network itself, but Sony’s executives.

  • News: Japan testing 'virus' cyberdefence weapon, reports say

    The Japanese authorities have tested a ‘virus’ cyberweapon capable of tracing and disabling computers being used in cyberattacks against the country, a newspaper in the country has reported.



IDG UK Sites

Nexus 6 vs Samsung Galaxy Note 4 comparison: What's the best Android phablet?

IDG UK Sites

The iPhone is doomed. Doomed to be marginally less successful than a very successful thing.

IDG UK Sites

How to prototype native mobile apps without writing code

IDG UK Sites

How to prepare for and update to OS X Yosemite: Get your Mac ready to download & install Apple's...