The view from the top of IT with TechWorld Editor Rohan Pearce
The amount of cybercriminal activity associated with the Zeus family of financial Trojan programs has increased during the past few months, according to security researchers from antivirus vendor Trend Micro.
By Lucian Constantin | 24 May, 2013 17:01
Security researchers from antivirus vendor ESET discovered a piece of cyberespionage malware targeting Tibetan activists that uses unusual techniques to evade detection and achieve persistency on infected systems.
By Lucian Constantin | 24 May, 2013 14:41
The latest version of Google's sophisticated anti-spam algorithm, dubbed Penguin 2.0, was announced yesterday in an official blog post from the company's well-known webspam czar, Mike Cutts.
By Jon Gold | 24 May, 2013 14:18
Google plans to upgrade the security of its SSL (Secure Sockets Layer) certificates, an important component of secure communications.
By Jeremy Kirk | 24 May, 2013 07:00
Microsoft brushed off a dubious hacker's claim on Thursday that he stole 47 million account credentials for Microsoft's Xbox Live gaming service.
By Jeremy Kirk | 24 May, 2013 02:32
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry for a new one from your wireless carrier; you and a friend are swapping devices; you loaded too many applications or media and just want to start over from scratch; etc.
By Al Sacco | 15 December, 2010 07:11
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.
By Tony Bradley | 15 December, 2010 07:13
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
By Tony Bradley | 11 November, 2010 07:42
Developers being overly trusting is one of them.
By Kenneth van Wyk | 21 May, 2013 20:56
China's remarkable success in infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology, security experts say. They're just very persistent and very good at remaining undetected for long periods of time.
By Jaikumar Vijayan | 20 May, 2013 10:14
New social media privacy laws that have been enacted in several states around the country, or are in the works, present something of a mixed bag for businesses.
By Jaikumar Vijayan | 15 May, 2013 10:10
Alberto Yusi Lajud Pena, found dead in the Dominican Republic two weeks ago, was the leader of the New York cell of an international gang of cyber thieves that authorities allege stole a staggering $45 million from ATM machines around the world.
By Jaikumar Vijayan | 10 May, 2013 20:26
IT can never take all the risk out of a supply chain, but it can help organizations minimize their vulnerability in a world of new threats.
By Howard Baldwin | 30 April, 2013 10:45
With many backup and recovery strategies not keeping up with rampant data growth and increasing migration to virtual environments, many in-house IT budgets are stretched to breaking point. This whitepaper outlines the best practice in delivering a backup strategy that is efficient, effective and affordable. Click to download!