The view from the top of IT with TechWorld Editor Rohan Pearce
An intermediate certificate authority (CA) registered to the French Ministry of Finance issued rogue certificates for several Google domains without authorization.
By Lucian Constantin | 09 December, 2013 17:13
Twitter has implemented new security measures that should make it much more difficult for anyone to eavesdrop on communications between its servers and users, and is calling on other Internet companies to follow its lead.
By Martyn Williams | 22 November, 2013 23:22
A new financial malware program that communicates with attackers over the I2P (Invisible Internet Project) anonymity network is for sale on a Russian cybercrime forum.
By Lucian Constantin | 21 November, 2013 17:53
Hackers reportedly stole 42 million customer records including email addresses and clear-text passwords from Cupid Media, a network of dating websites.
By Lucian Constantin | 20 November, 2013 15:57
Microsoft patched serious vulnerabilities Tuesday in Windows, Internet Explorer and Office, but also urged customers to stop using the aging RC4 cipher and SHA-1 hashing function in their systems and services.
By Lucian Constantin | 13 November, 2013 14:59
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
By Tony Bradley | 11 November, 2010 07:42
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up properly. But most expensive? Surviving the backlash and legal consequences of losing customer data, financial records and private company information.
By James E. Gaskin | 14 May, 2009 04:34
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
An encryption initiative runs into the law of unintended consequences, since the legal department can't search encrypted emails for e-discovery purposes.
By Mathias Thurman | 14 January, 2013 11:04
The largest single type of security breach is the stolen or lost laptop, according to the Open Security Foundation, yet these computers are among the least protected of all IT assets. The costs of a data breach can be huge, including the loss of trade secrets, marketing plans, and other competitive information that could have long-term business damage, plus the immediate costs of having to notify people if their personal information was possibly at risk from the breach. Particularly in a recession, enterprise management can't afford to take these risks lightly.
By Mel Beckman | 20 January, 2009 08:55
Smartphones are rapidly becoming an indispensable communication and computing tool for the world’s expanding mobile workforce. As Smartphones and other handheld wireless communication devices become an integral part of the modern business landscape, the advances in flexibility, power, and mobile access come with a risk. Find out how to stay competitive in a changing business world and leverage technology to meet future needs.