security - News, Features, and Slideshows
- How to fix the two-factor authentication log-in error in Gmail on Android
- How to fight back against CryptoLocker
- Obama orders chip-and-PIN in government credit cards
- China again blames US for disrupted cybersecurity talks
security in pictures
Network-attached storage (NAS) devices are riddled with vulnerabilities that can put the security of sensitive data and networks at risk, a researcher has found. To prove his point, he has created a proof-of-concept worm that can infect devices from three different manufacturers.
By Lucian Constantin | 21 October, 2014 03:11
Following the iPhone 6 launch in China, Apple's iCloud service began facing a "man-in-the-middle" style attack in the country, in an apparent attempt to steal username and password information, according to an anti-censorship watchdog group.
By Michael Kan | 20 October, 2014 21:36
China claimed on Sunday the U.S. has derailed cybersecurity cooperation between the two countries and that it doesn't tolerate hacking.
By Jeremy Kirk | 20 October, 2014 13:13
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry for a new one from your wireless carrier; you and a friend are swapping devices; you loaded too many applications or media and just want to start over from scratch; etc.
By Al Sacco | 15 December, 2010 07:11
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.
By Tony Bradley | 15 December, 2010 07:13
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
It's looking more and more likely that Microsoft Security Essentials (MSE) is warning about a Trojan:DOS/Alureon.J infection when none exists.
By Woody Leonhard | 08 October, 2014 22:30
The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the US payment system to smartcard technology can't happen fast enough.
By Jaikumar Vijayan | 16 August, 2014 20:49
What businesses know about any given individual is a lot. But what are companies doing with that data? Not as much as you might think -- at least not yet. Companies are getting more sophisticated, however.
By Robert L. Mitchell | 06 August, 2014 01:33
Getting employees to take security seriously can be a game that everyone wins.
By Lamont Wood | 17 July, 2014 14:05
Whitepapers about security
The 2014 Internet Security Threat Report highlights the developments in cyber-crime in the last year and provides an analysis in global threat activity. Highlights from the report are: • Hackers continuing to attack PCs, as well as mobile devices, security cameras, routers and more • The number of data breaches has risen 62% from 2013, identity breaches up 493% • Ransomware attacks rose 500% and have evolved into more vicious assaults
Benefits based on Forrester Consulting Study “The Total Economic Impact of Converging SAP Landscapes on Vblock™ Systems”
- FTDigital Performance Manager - MediaNSW
- FTAccount Manager - DataNSW
- FTSEM Specialist - SEM AnalystNSW
- FTStrategic Account Manager - Google AnalyticsNSW
- FTData Product SpecialistNSW
- FTCampaign Managers | Programmatic / RTB | Display + Video | Trading desk |SydneyNSW
- FTClient Service Director - Search: SEO & PPCNSW
Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
- First products from Apple-IBM deal to come next month
- 11 startups enter muru-D accelerator program
- Smartsheet, the project management tool cloaked as a spreadseet, adds visualization
- In Pictures: Windows 10 - A guided tour
- In Pictures: 15 Must-Have Android, iOS apps for business travelers
- In Pictures: 15 of the scariest things hacked
- Apple Pay could be a big deal for Android users
- Mitel takes aim at Avaya with ShoreTel bid
- Microsoft goes all-in on hybrid Cloud with Azure-in-a-box
- Apple iOS 8.1 is here: Not your run of the mill Dot One release
- Microsoft (hearts) Linux, for Azure's sake
- IPhones dial in larger Apple profit in fourth quarter
- Telephony vendor Mitel goes public with $540M bid for ShoreTel
- Sprint cuts 452 HQ jobs in IT, network and technology areas
- Office Mix now lets PowerPoint users create on the fly