We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

More Security Articles

  • Opinion: Julian Assange: Facebook an 'Appalling Spying Machine'

    Julian Assange claims that Facebook is complacent in providing the U.S. government with a way to spy on its citizens, calling it "the most appalling spying machine ever invented."

  • News: Sony Online Entertainment Hacked, 12,700 Credit Cards Stolen

    Not quite out of the frying pan, but into the fire anyway: Sony just acknowledged another network breach related to the first one.

  • News: Can a new CISO improve Sony PlayStation Network security?

    Can a chief information security officer (CISO) help prevent the kind of massive data breach that occurred in the Sony PlayStation network breach last month in which attackers grabbed personal information on an estimated 77 million customers of the PlayStation and Qriocity online games?

  • Opinion: Buckle Up Before Entering the Telework On-Ramp

    On April 28, 2011 Jacob Lew released an OMB memorandum Implementing Telework Enhancement Act of 2010 IT Purchasing Requirements, giving agency CIOs, in coordination with chief acquisition officers, 90 days to develop or update policies on purchasing computing technologies and services to enable and promote telework. Additionally, purchasing policies must address the information security threats raised by use of technologies associated with telework. While telework can produce resource savings and reduce time, expenses, and greenhouse gas production associated with weekly commuting, it also provides federal employees the ability to continue working during inclement weather, emergencies, or situations that may disrupt normal operations. However, telework is only as effective as the technologies used to support it, which is why it is critical for agencies to take measures to ensure that their

  • News: Fake security software takes aim at Mac users

    Scammers are distributing fake security software aimed at the Mac by taking advantage of the news that al-Qaeda leader Osama Bin Laden has been killed by U.S. forces, a security researcher said today.

  • Opinion: Fake 'MacDefender' Brings Malware to Macs

    Fake anti-virus software is an old breed of malware that's finally found a new trick: Attacking Macs.

  • News: New Mac Trojan horse masquerades as virus scanner

    By and large, Mac users have been able to escape the onslaught of malware that their Windows counterparts suffer from. But every once in a while, a piece of nastiness slips into the wild. The latest offender is a Trojan horse by the name of MAC Defender, which purports to be a virus-scanning application. In fact, it does little more than encourage users to give up their credit card information.

  • News: Osama Bin Laden news spurs wave of scams, malware

    Malware creators are already using the news of Osama Bin Laden's death as a opportunity to try and dupe people into clicking on malicious links. According to cloud-security firm Zscaler, researchers were already seeing malicious sites emerge to capitalize on the news within hours of the announcement.

  • News: Fake AV makers, scammers exploit Bin Laden news

    The death of Osama Bin Laden is the latest event to spur malware makers and scammers into action.

  • News: Security stepped up around U.S. following Bin Laden news

    While many around the world rejoiced at news that Osama Bin Laden, Al-Qaeda founder and architect of the September 11th attacks, had been killed by U.S. military forces, the news does not come without concern about possible violence in the aftermath of the historic event.

  • News: Bin Laden's villa lacked Internet, phone service

    Intelligence officials say a lack of Internet and telephone service at a Pakistani compound was a key reason to suspect Osama bin Laden was hiding there.

  • News: Home Wi-Fi Network Security: 4 Ways to Avoid Big Trouble

    The risks of not properly securing your home wireless network continue to increase. Consider the newest tales from the dark side then follow four steps to stronger Wi-Fi network security.

  • News: Starbucks Customers Targeted by Laptop Thieves

    Starbucks isn't just an inviting place for sipping lattes and getting free unlimited Wi-Fi on your laptop, it's also a favorite spot for thieves. The New York Times is reporting a trend in thefts at the popular coffeehouse, as thieves snatch laptops, handbags, iPads, and whatever else customers carelessly leave unsecured while they order their drinks or go use the restroom.

  • News: PlayStation lawsuit could mean long wait by customers for not much

    PlayStation Network customers involved in a class-action lawsuit against Sony could be waiting years for small compensation for damages they suffer as a result of their personal information being stolen during a breach last month, according to the lead attorney in the suit.

  • Video: Sony apologises for PlayStation Network attack, outage

    Sony executives apologise for the potential loss of personal information

  • News: Sony finds no apparent Anonymous link to PlayStation attack

    Sony said it has found no link between an attack on its PlayStation Network and Qriocity services and Internet activist group Anonymous, which had earlier targeted its systems.

  • News: Internal emails show Google tracks your location

    A series of internal e-mails from last year highlights how important location data is to Google, and likely gives more ammunition to privacy advocates over how these companies track your every move.

  • Opinion: Why you shouldn't care about location tracking

    I sat down at my computer, prepared to sync my iPhone 4 with iTunes. But I looked at the simple white cord I use to connect the phone, and it suddenly seemed more ominous -- like it was some sort of spy transmitter, sending the private details of my life directly to Apple.

  • Feature: 10 tips to turn Android into a business phone

    Android has shot past BlackBerry to become the third most popular smartphone operating system in the world behind Symbian and the iPhone, according to StatCounter.

  • News: Privacy Lost: The Amazing Benefits of the Completely Examined Life

    Your iPhone's tracking you. Your game network just surrendered all your personal data. And your mom is posting your potty-training videos on Facebook. Like many of us, you're laboring under the delusion that privacy matters--that there's such a thing as too much (public) information. It's time to get over it! Soon we'll all recognize the positives of exposing every aspect of our lives. What a relief it will be when we've finally revealed everything and have nothing left to hide. Herewith, the potential benefits of our upcoming, privacy-free utopia:



IDG UK Sites

iPhone 6 review: best ever iPhone is very good... but no longer the best phone you can buy

IDG UK Sites

Why Apple and Samsung, Google and Microsoft's schoolyard spats make them all look stupid

IDG UK Sites

How to successfully bridge the gap between clients and creatives

IDG UK Sites

How to update your iPhone or iPad to iOS 8: including how to install iOS 8 if you don't have room ()......