We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

More Security Articles

  • Feature: Best Android apps: Five free data removal tools

    If you're planning on passing on your old Google Android smartphone, either to a friend or family member, or online through an auction site such as eBay or a mobile phone recycling service, it's worth remembering you should completely remove all your data before you hand your mobile phone over.

  • News: Corporate-owned vs. employee-owned mobile devices

    If an employee walked into work one day clutching his shiny new iPhone, iPad, Android or other mobile smartphone or tablet, wanting to use it for official corporate business, would you say yes?

  • News: SSL certificate authorities vs. ???

    With all the publicity about breaches of SSL certificate authorities and a hack that exploits a vulnerability in the supposedly secure protocol, it's time to consider something else to protect Internet transactions. If only there were something else to turn to.

  • News: Symantec unveils Norton Tablet Security

    Symantec has finally unveiled its Norton Tablet Security software designed to protect tablet PCs that run the Google Android platform.

  • News: Wikileaks' Assange can be extradited to Sweden, say appeals court judges

    WikiLeaks founder Julian Assange lost an appeal in the U.K.'s High Court on Wednesday that sought to block his extradition to Sweden on potential charges of rape and molestation.

  • News: Study: User tools to limit ad tracking are clunky

    People who want to limit the behavioral advertising and tracking they are subjected to on the Web aren't well served by some popular privacy tools, according to a Carnegie Mellon University study.

  • News: Study: User tools to limit ad tracking are clunky

    People who want to limit the behavioral advertising and tracking they are subjected to on the Web aren't well served by some popular privacy tools, according to a Carnegie Mellon University study.

  • News: Disruptive technologies and BYO devices are top customer worries: Juniper

    Disruptive technologies and the rise of bring your own (BYO) devices are two of the biggest challenges facing IT managers, Juniper has claimed.

  • Opinion: Safety: The Missing Third Leg in the Energy Storage Stool

    Electrons don't like to sit still. That's why the electricity grid has developed over the last 150 years without the benefit of energy storage. Energy storage is--in whatever form it might take--an elaborate attempt at getting electrons to behave while in a passive state. It's been clear for thousands of years that energy storage is physically possible. What has held it back from widespread adoption (outside of fossil fuels and consumer electronics batteries) has been safety. Safety can be achieved, but the cost of engineering danger-mitigation solutions makes most energy storage systems too costly. A recent string of safety incidents at new energy storage facilities around the world have underlined the fact.

  • News: Telcos make OAIC's 2010-11 top 10 privacy complaints list -- updated

    Telecommunications, finance and health companies, along with government agencies, have featured prominently in the complaints received by the Office of the Australian Information Commissioner (OAIC) during the past year.

  • News: DHS to set up policies for monitoring Twitter, Facebook

    When the U.S. Department of Homeland Security receives information about potential threats to the U.S., agents may turn to social networking sites like Facebook and Twitter.

  • News: Microsoft unlikely to patch Duqu kernel bug next week

    The odds are that Microsoft won't patch the Windows kernel bug next week that the Duqu remote-access Trojan exploits to plant itself on targeted PCs, a researcher said today

  • News: Duqu exploits zero-day flaw in Windows kernel

    The Duqu trojan infects systems by exploiting a previously unknown Windows kernel vulnerability that is remotely executable.

  • News: BC/DR spending not a top budget priority

    Organizations continue to spend on business continuity and disaster recovery, but BC/DR is still not a budget top priority, according to newly-released data from Forrester Research.

  • News: Online Privacy: How to Block Google Ads and Adjust Your Settings

    Sometimes the ads that appear in your Google search results or in Gmail are a bit of a mystery. That's why Google is now explaining how they work and rolling out two new features: one that gives you transparency into why the ads are appearing and one that lets you manage the ads that you see.

  • News: Cisco taps former VMware exec to head security push

    Cisco today announced a former VMware executive will head up the newly formed Cisco Security Group at Cisco, which combines two formerly separate units into one security-focused group.

  • News: Duqu exploits zero-day Windows kernel vulnerability to infect computers

    Security researchers from the CrySyS laboratory in Hungary have located an installer for Duqu, the Stuxnet-inspired threat that has kept the security industry on its toes for the past couple of weeks, and determined that it exploits a previously unknown vulnerability in the Windows kernel.

  • News: US intelligence group wants to change the way chips are made

    The cutting-edge intelligence research development arm of the government wants to take advantage of the world's semiconductor manufacturing capacity but make sure that U.S. security and intellectual property protection is baked in.

  • News: Facebook denies vulnerability, then quietly fixes it

    Facebook has apparently fixed a vulnerability in its social-networking site after insisting it wasn't a weakness and didn't need to be remedied.

  • News: Stanford Program Decrypts Captchas, Spam Bots Inbound

    You know those annoying boxes of jumbled, multicolored, slanted, crossed-out, or reversed text that are practically indecipherable to prove to a Website that you are human? They're called captchas, and a team of Stanford University researchers may have just completely debunked this text-based security system with a computer program than can decode them.



IDG UK Sites

Sky to offer mobile phone contracts with O2: Will Vodafone make a move?

IDG UK Sites

Windows 10: a guaranteed success. Probably.

IDG UK Sites

Do we need to fight the government again over design and art education?

IDG UK Sites

How to make money selling books on the iBookstore, publish your book in Apple's book store