Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.
By Lucian Constantin | 19 April, 2014 03:20
Twitter's new mobile advertising suite lets companies pitch their mobile apps in promoted tweets or place ads inside other apps.
By Loek Essers | 18 April, 2014 20:46
About 2.6 million payment cards at Michaels Stores and another 400,000 at subsidiary Aaron Brothers may have been affected in a card skimming attack that compromised its point-of-sale systems, the retailer said Thursday.
By John Ribeiro | 18 April, 2014 13:05
National security may be at stake as private businesses try to manage a growing number of cyberthreats, but IT professionals shouldn't have to bear that burden alone.
By Stephen Lawson | 18 April, 2014 08:47
For Americans used to roughly 10Mbps broadband connections, the idea of gigabit Internet can feel a little like science fiction. Streaming 4K video without hiccups? Enormous file downloads happening in seconds? Oh, sure.
By Jon Gold | 18 April, 2014 08:04
Worried about how the Heartbleed vulnerability may affect your personal accounts? A new tool may be of help.
By Joab Jackson | 18 April, 2014 06:33
The Stuxnet malware known to have stealthily targeted Iranian nuclear facilities a few years ago was a wake-up call about how vulnerable critical industrial systems can be to cyberattack. Now, an Israeli start-up, with help from General Electric, is testing security technology that would detect Stuxnet-like attacks on critical infrastructure systems used for power production.
By Ellen Messmer | 18 April, 2014 06:17
The Tor Project has flagged 380 Tor relays vulnerable to the critical Heartbleed flaw to be rejected from the Tor anonymity network, reducing the network's entry and exit capacity.
By Lucian Constantin | 18 April, 2014 03:15
Oracle is gearing up for a fight with officials in Oregon over its role developing an expensive health insurance exchange website that still isn't fully operational.
By Chris Kanaracus | 18 April, 2014 02:24
Cybercriminals have started using a sophisticated Android Trojan app designed for e-banking fraud to target Facebook users, possibly in an attempt to bypass the two-factor authentication protection on the social network.
By Lucian Constantin | 17 April, 2014 21:59
Microsoft on Wednesday extended the Windows 8.1 Update migration deadline for businesses by three months, but again told consumers they had less than four weeks to make the move before the company shuts off their patch faucet.
By Gregg Keizer | 17 April, 2014 20:49
Microsoft may have retired Windows XP, but one of China's leading security vendors is trying to keep the OS threat-free, and rolling out protection software to hundreds of millions of users in the nation.
By Michael Kan | 17 April, 2014 14:42
Sales of Sony's PlayStation 4 platform have surpassed 7 million units worldwide but supply problems are continuing, the electronics giant said.
By Tim Hornyak | 17 April, 2014 14:16
Internet entrepreneur Kim Dotcom says he's won a court battle in New Zealand to get back assets taken during his arrest on piracy charges.
By AAP | 17 April, 2014 10:47
Canadian police have arrested a 19-year-old man for allegedly using the Heartbleed bug to steal data about taxpayers.
By Stephen Lawson | 17 April, 2014 09:31
Socially-engineered malware tries to trick users into downloading and executing malicious code through tactics that include everything from fake antivirus to fake utilities to fake upgrades to the operating system and trojanized applications.
By Ellen Messmer | 17 April, 2014 07:07
In this Network World Digital Spotlight, "Harnessing Gigabit Wi-Fi," we do a deep dive on the latest Wi-Fi developments.
By John Dix | 17 April, 2014 05:05
With nearly every major threat to information security, it is not long before security experts ask the question, "Can the threat play a role in distributed denial of service (DDoS) attacks?" When it comes to Heartbleed, some people are screaming that the sky is falling, but it is more complicated than that.
By Jeffrey A. Lyon, CISSP-ISSMP, founder of Black Lotus Communications | 17 April, 2014 05:05
A new webmail service called Lavaboom promises to provide easy-to-use email encryption without ever learning its users' private encryption keys or message contents.
By Lucian Constantin | 17 April, 2014 02:27
Oracle has issued a comprehensive list of its software that may or may not be affected by the OpenSSL (secure sockets layer) vulnerability known as Heartbleed, while warning that no fixes are yet available for some likely affected products.
By Chris Kanaracus | 17 April, 2014 01:30
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTMicrosoft Business Intelligence DeveloperNSW
- FTOBIEE BI/DW ConsultantNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTIT Support EngineerNSW
- FTContent StrategistNSW
- FTDeliverability SpecialistNSW
Insights from the 2013 IBM Chief Information Security Officer Assessment which uncovered a set of leading business, technology and measurement practices that help to address the questions CISO's and security leaders have in managing diverse business concerns, creating mobile security policies and in fully integrating business, risk and security metrics.
- Google invites Glass wearers to brave LA's beaches
- Telerik frees HTML5 collection of components
- Space X rocket en route to ISS with space laser cargo
- AMD steers clear of low-cost tablet market
- Experts: Avoid big mistakes with Oracle's Exadata
- Steve Jobs' character becomes issue in Silicon Valley no-hiring case
- FCC vote on incentive auction plan could further open broadband competition
- Google tech to bring 3D mapping smarts to NASA's space station robots
- Plastic computers taking shape, but won't replace silicon
- Apple has bigger plans than just song ID with Shazam deal
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Americans cool with lab-grown organs, but not designer babies
- IE6: Retired but not dead yet
- Twitter to promote app downloads in mobile timelines
- Can you hear me now? NASA to test laser communication system