- Akamai admits its OpenSSL patch was faulty, reissues keys
- Google updates terms of service to reflect its scanning of users' emails
- Glass all gone after one-day sale, Google says
- How to fix the two-factor authentication log-in error in Gmail on Android
data breach in pictures
Four researchers working separately have demonstrated a server's private encryption key can be obtained using the Heartbleed bug, an attack thought possible but unconfirmed.
By Jeremy Kirk | 14 April, 2014 11:15
The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them from January 1 to March 27.
By Ellen Messmer | 09 April, 2014 08:30
A 5-year-old San Diego boy has been commended by Microsoft for his security skills after finding a vulnerability in the company's Xbox games console.
By Zach Miners | 05 April, 2014 10:48
A group of state attorneys general in the U.S. is launching an investigation into a recently disclosed data breach of 200 million personal records at a subsidiary of credit monitoring firm Experian.
By Grant Gross | 04 April, 2014 08:17
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
Think you can guess the No. 1 threat to the security of your stored data? If you said hackers, or even trouble-making insiders, you'd be wrong. While malicious threats are an ongoing concern, it's your well-meaning employees who are more likely to unknowingly expose your company's stored data through, say, a file-sharing network or a misplaced laptop.
By Mary Brandel | 10 February, 2009 09:12
A new report warns that the cost from lost productivity at work related to the new NFL season could add up to US$10.5 billion. And there we were, thinking the biggest waste of time at work came from fielding an endless stream of IT industry reports?
By Network World staff | 16 September, 2008 09:53
Whitepapers about data breach
A study conducted by Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information Security Service, Police Central e-Crime Unit and United States Secret Service. This year our DBIR includes more incidents, derived from more contributors, and represents a broader and more diverse geographical scope. The number of compromised records across these incidents skyrocketed back up to 174 million after reaching an all-time low (or high, depending on your point of view) in last year’s report of four million. In fact, 2011 boasts the second-highest data loss total since we started keeping track in 2004. Read this report.
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTOBIEE BI/DW ConsultantNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTIT Support EngineerNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTExecutive Producer/Head of Production: Advertising AgencyNSW
- FTDeliverability SpecialistNSW
An enterprise resource planning (ERP) software solution provides the ability to access the right information, from the right source, at the right time, empowering all users throughout the supply chain. This report explains how your solution can identify the resources needed to capture, produce, ship, and account for customer orders, while supporting the various manufacturing processes.
- Still deploying 11n Wi-Fi? You might want to think again
- Can Heartbleed be used in DDoS attacks?
- Google opens the floodgates for new 'social' ads
- Net neutrality ruling complicates US transition to IP networks
- Lavaboom builds encrypted webmail service to resist snooping
- Teardown: Galaxy S5 parts cost 21% more than iPhone 5S
- Oracle identifies products affected by Heartbleed, but work remains on fixes
- Developers get access to more Sony camera features
- Microsoft slashes Windows XP custom support prices just days before axing public patches
- Tata revenue, profit up on strong outsourcing demand
- German researchers hack Galaxy S5 fingerprint login
- Telefónica starts exchange for targeted mobile ads
- Glass all gone after one-day sale, Google says
- Mt. Gox has filed for liquidation in Japan, says report
- Microsoft's Chinese partner confident Xbox can compete against Android consoles