We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

More Security News

  • News: RSA security lapse led to March hack, says researcher

    The attack that hacked RSA Security's network earlier this year succeeded because the company failed to take a basic security precaution, a researcher said today.

  • News: Raytheon acquires cybersecurity vendor Pikewerks

    Defense and aerospace systems vendor Raytheon has acquired cybersecurity vendor Pikewerks in an effort to add to Raytheon's capabilities to defend against sophisticated threats facing customers in the intelligence, defense and commercial sectors, the companies announced Monday.

  • News: Sourcefire shipping its first two app-aware, next-gen firewalls

    Sourcefire Monday said it expects to begin shipping its first two next-generation firewall appliances later this month, entering an increasingly crowded market.

  • News: Cyber-thieves using DDoS to distract banks and victims from spotting fraud

    Cyber-thieves are using distributed denial-of-service (DDoS) attacks in order to distract banks from spotting and reversing fraudulent wire transfers initiated on behalf of their customers.

  • News: Lookout releases free Carrier IQ detection app

    A mobile security software company last Friday released a tool that detects Carrier IQ, the software embedded in numerous smartphones that has raised questions from users, privacy advocates and even Congress.

  • News: Browsing history can be stolen despite current defenses, expert demonstrates

    Stealing browsing history is still possible despite defenses currently implemented in browsers, according to Google security engineer and vulnerability researcher Michal Zalewski.

  • News: Carrier IQ: A privacy tempest in your pants pocket

    Privacy and cyber law experts weigh in on the privacy implications surrounding the Carrier IQ mobile diagnostic software.

  • News: Book Advises How to Protect Your Reputation Online

    The phrase "my life is an open book" has never been truer than it is today. The Internet, coupled with the growing popularity of social networking sites like Facebook, Twitter, and LinkedIn, have exposed many personal histories to anyone with access to cyberspace.

  • News: European regulators start investigating Carrier IQ

    Organizations and regulators across Europe, including Germany, have started looking into the use of Carrier IQ's tracking software, to ensure that mobile phone vendors and operators are not violating users' privacy.

  • News: Tips For Mobile Device Users Worried About Latest Security Flaws

    Mobile device users worried their personal data may not be safe in light of recent reports of security flaws can download apps, monitor tell-tale signs and adjust settings to protect themselves.

  • News: Spending on security companies booming, PwC finds

    The $60 billion global computer security industry has become a hot sector for a range of investors, including mainstream IT companies, aerospace, defence giants and private equity, a PricewaterhouseCoopers (PwC) analysis has reported.

  • News: HTML5 to create new challenges for security pros in 2012: Sophos

    The move to HTML5 will enable a whole host of new web applications, but could also create new challenges for enterprise security professionals, according to UK security firm Sophos.

  • News: Lawmaker asks FTC to investigate Carrier IQ

    The outcry over Carrier IQ's mobile-phone tracking software continued Friday, with a U.S. congressman asking the Federal Trade Commission to investigate the company.

  • News: NZ mobile operators deny using Carrier IQ key logger

    New Zealand mobile networks are distancing themselves from the recently discovered monitoring software installed surreptitiously on millions of phones overseas.

  • News: Carrier IQ: What you need to know

    Keys, wallet, phone. If you're like me, it's a little dance you do every time you're about to leave the house to make sure you've got these three most important of possessions. But, as an important as your keys and wallet are, smartphones are even more so these days. They're not only our phones, they're our virtual wallets, our confidants, our links to the outside world. They go everywhere with us--which is why we take it so seriously when we hear anything about their security being compromised.

  • News: Skeptics find flaws in Carrier IQ application analysis

    Only now are some skeptical voices being raised that the case against Carrier IQ may be a rush to judgment without a real, or at least an adequate, basis in fact.

  • News: Carrier IQ, HTC, Samsung hit with class-action lawsuits

    In what could be a precursor of legal action to come, mobile software vendor Carrier IQ has been hit with two lawsuits over the use of its controversial tracking technology in tens of millions of mobile phones worldwide.

  • News: Consumer Watchdog calls for investigation of Carrier IQ, carriers

    Consumer Watchdog has called for a U.S. government investigation of Carrier IQ, the maker of tracking software for mobile phones, and its users.

  • News: Gartner predictions for 2012: More cloud, consumerization, loss of IT control

    IT budgets and responsibilities are moving out of the control of IT departments and into the hands of others, thanks to trends such as consumerization and cloud computing, Gartner says in its vision for 2012 and the coming years.

  • News: Security roundup for week ending Dec. 2: Carrier IQ stink, SCADA troubles

    If a cyberattack from a hostile foreign source ever hit a public electric or water utility, affecting its industrial control systems, causing America's critical infrastructures to fail, would we understand that had even happened? We have more doubts than ever, after every twist and turn in the saga that began with the Nov. 10th "Public Water District Cyber Intrusion" report from the Illinois Statewide Terrorism & Intelligence Center (STIC) that set off a media firestorm after the report was leaked to the media. The Illinois STIC report said a cyberattack from Russia had hit an Illinois water facility, causing a water pump to fail. The Dept. of Homeland Security (DHS) and the FBI, in tandem with the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), has since concluded that Illinois STIC report was in error http://www.networkworld.com/news/2011/120111-scada-faq-253663.html?hpg1=bn. It may have been—it would not be surprising if reasonable doubts remain--but this episode of intelligence failures and slow response times has laid bare how poorly prepared America is, as Network World Editor in Chief John Dix summarizes in his editorial, "The Water Pump Alarm" http://www.networkworld.com/columnists/2011/120111-editorial.html. This fiasco related to the Curran-Gardner Townships Public Water District in Springfield, Illinois , which offers a rare glimpse into how the secretive intelligence-gathering "Fusion Centers" promoted by DHS really operate—raises the question whether America's critical-infrastructure response system even works at all—or is need of critical re-thinking http://www.networkworld.com/news/2011/120111-scada-253659.html?hpg1=bn.



IDG UK Sites

iOS 8 release date, new features and compatibility: Free to download from 6pm

IDG UK Sites

Why local multiplayer gaming is rapidly vanishing: we look at the demise of split-screen and LAN...

IDG UK Sites

Colour-depth not resolution is what will make 4K a success or failure

IDG UK Sites

iPhone 6 vs iPhone 6 Plus: Which new iPhone 6 model should I buy?