online safety - News, Features, and Slideshows
Over the last few days, a large number of British Airways customers have found that reward points they accumulated for flights, called Avios, have disappeared from their accounts. Others have been locked out of their accounts completely.
By Lucian Constantin | 30 March, 2015 19:58
Some Internet gateway devices commonly used by hotels and conference centers can easily be compromised by hackers, allowing them to launch a variety of attacks against guests accessing the Wi-Fi networks.
By Lucian Constantin | 27 March, 2015 22:46
Microsoft has blacklisted a subordinate CA certificate that was wrongfully used to issue SSL certificates for several Google websites. The action will prevent those certificates from being used in Google website spoofing attacks against Internet Explorer users.
By Lucian Constantin | 26 March, 2015 00:59
Flash files that are vulnerable to a serious flaw patched by Adobe Systems over three years ago still exist on many websites, exposing users to potential attacks.
By Lucian Constantin | 25 March, 2015 01:18
Security researchers who participated in the Pwn2Own hacking contest this week demonstrated remote code execution exploits against the top four browsers, and also hacked the widely used Adobe Reader and Flash Player plug-ins.
By Lucian Constantin | 20 March, 2015 23:08
Summer vacation is in full swing in large parts of the Northern Hemisphere, and it's time for parents to talk to their teenagers about staying safe during the extra hours they will spend online, three online safety experts said.
By Grant Gross | 08 July, 2009 03:45
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
- FTSenior SQL DBANSW
- CC.Net Solution ArchitectNSW
- CCMobile iOS DeveloperNSW
- FT.Net Solution ArchitectNSW
- CCSenior Systems EngineerNSW
- FTBusiness Management - Account Director - Leading Entertainment ClientNSW
- CCMobile Designer / Developer - IOSNSW
- CCMobile Designer / Developer - IOSNSW
- FTJunior Media Buyer - Sales CoordinatorNSW
- CCFront End Web Developer (Drupal)NSW
- CCDBA (Oracle/SQL)NSW
- FTApplication Support SpecialistNSW
- CCSenior Release EngineerNSW
More and more government agencies are turning to a BYOD strategy. While this can make more transactions mobile and potentially decrease IT costs, they may also make the agency vulnerable to security breaches. •One of the biggest threats is social engineering, a process by which an adversary tricks the user into offering up information or access rights. •While there are several types of social engineering to be on the lookout for, there are three dominant attacks to watch •As agencies debate expanded device and data management policies, creating a divide between personal and professional content is essential
- Abolish geoblocking? Not so fast, says EU digital Commissioner
- Vodafone adds bank cards to mobile payment service
- Bitcoin in China still chugging along, a year after clampdown
- The Upload: Your tech news briefing for Monday, March 30
- Google Dart upgrade homes in on asynchronous programming
- British Airways notifies frequent flyers of possible breach of their accounts
- APIs: From developer tool to business model driver
- India backs open source software for e-governance projects
- Vodafone cuts complaints
- GitHub recovering from massive DDoS attacks
- In Pictures: How 20 (mostly) tech companies' logos have evolved over the years
- In Pictures: Worst data breaches of 2014
- In Pictures: 9 security gadgets for mobile devices
- 'Largest DDoS attack' in GitHub's history targets anticensorship projects
- FCC will vote next month on plan to share valuable 3.5GHz spectrum