Malware and Vulnerabilities - News, Features, and Slideshows
A growing tendency by business units and workgroups to sign up for cloud services without asking their IT organization creates serious risks for enterprises.
By Jaikumar Vijayan | 25 August, 2014 22:59
A week after Microsoft pulled a Patch Tuesday update that crippled some Windows 7 PCs, the company has yet to provide a working fix for either the original flaw or the resulting problem.
By Gregg Keizer | 22 August, 2014 21:31
Although Microsoft has pulled a patch from Windows Update that crippled some computers, it is still pushing a truncated version of the security update that contained the flawed fix.
By Gregg Keizer | 18 August, 2014 23:34
Microsoft is quietly recommending that customers uninstall one of last week's security updates after users reported that it crippled their computers with the infamous "Blue Screen of Death."
By Gregg Keizer | 18 August, 2014 03:45
A data breach at Supervalu Inc., one of the largest grocery wholesalers and retailers in the U.S., could affect thousands of people who shopped at the company's stores in June and July.
By Jaikumar Vijayan | 16 August, 2014 03:36
Microsoft has pulled out the big guns - a fear-of-God approach - to scare users into dumping Windows XP, telling them the most popular tasks done on a PC will put them in the crosshairs of cyber criminals.
By Gregg Keizer | 26 March, 2014 16:06
Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane.
By Jaikumar Vijayan | 14 March, 2014 10:27
As bitcoin values jumped in the last months of 2013, malware designed to steal the virtual currency exploded, security researchers from Dell SecureWorks said this week.
By Gregg Keizer | 28 February, 2014 20:36
Target's acknowledgement Friday that personal data of 70 million people, not 40 million as previously thought, may have been exposed to hackers in a recent data breach raises new questions about the incident and how it could affect victims.
By Jaikumar Vijayan | 10 January, 2014 17:13
Whitepapers about Malware and Vulnerabilities
Organisations are seeking greater control over their outbound security. They’re looking to find solutions that offer the greatest protection and control to prevent data loss, ensure compliance and increase productivity. Where should they start? •Every year brings an even more extreme set of threats to the enterprise than the last •The push for increased confidentiality and the use of SSL everywhere has made it more difficult for enterprises to monitor Internet usage •While there are solutions that can help mitigate some of these risks, it’s critical for enterprises to adopt a comprehensive and streamlined way to maintain visibility and control
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
- CCDBA (Oracle/SQL)NSW
- FTSenior SQL DBANSW
- CCFront End Web Developer (Drupal)NSW
- CCMobile iOS DeveloperNSW
- CCMobile Designer / Developer - IOSNSW
- FT.Net Solution ArchitectNSW
- FTBusiness Management - Account Director - Leading Entertainment ClientNSW
- CCMobile Designer / Developer - IOSNSW
- CC.Net Solution ArchitectNSW
- FTJunior Media Buyer - Sales CoordinatorNSW
- CCSenior Systems EngineerNSW
- CCSenior Release EngineerNSW
- FTApplication Support SpecialistNSW
Delivering more products, heightened quality and shortened customers with flawless execution and minimal business interruption defines your supply chain success. This report discusses a newly developed end-to-end solution with the right tools to efficiently procure, assemble, ship and deliver the goods your customers want, when they want them.
- Google Cloud Launcher deploys VM-based apps in a snap
- Apple Watch mini-stores to open in London, Paris, Tokyo luxury retail shops
- BlackBerry posts second straight earnings gain
- Safari users in the UK can sue Google over alleged privacy violations
- BlackBerry shocks with Q4 profit but CEO Chen can't stop sales slide
- Startup takes the effort out of endpoint detection and response
- Vectra Networks ships a new sensor for its attack-detection gear
- Popular hotel Internet gateway devices vulnerable to hacking
- The Upload: Your tech news briefing for Friday, March 27
- Microsoft wants to make Powerpoint more Web-friendly, buys LiveLoop
- Telstra acquires healthcare analytics company
- UN to appoint watchdog to focus on privacy in digital age
- At Facebook, a sharpening focus on virtual reality
- Toshiba announces industry's densest 3D flash memory
- In Japan, smartphone apps time spring's cherry blossoms