security - News, Features, and Slideshows
- How to fix the two-factor authentication log-in error in Gmail on Android
- How to fight back against CryptoLocker
- How to figure out if a data breach is a hoax
- Facebook sets up shop on the Tor anonymity network
security in pictures
Pirate Bay co-founder Gottfrid Svartholm Warg was sentenced Friday by the Court of Frederiksberg in Denmark to three and a half years in jail for hacking and serious vandalism.
By Loek Essers | 01 November, 2014 01:55
Facebook has made its site directly available on Tor to prevent access problems for people using the anonymity network and to provide an alternative method of accessing the social network securely.
By Loek Essers | 01 November, 2014 00:30
Google is applying a surveying technique from the 1960s to a project that aims to collect data about users' computers without potentially compromising their privacy.
By Jeremy Kirk | 31 October, 2014 12:04
Apple should remove "spyware" from its new Yosemite release of OS X, according to an online petition that has received 14,450 signatures as of early Thursday afternoon.
By Jon Gold | 31 October, 2014 06:48
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry for a new one from your wireless carrier; you and a friend are swapping devices; you loaded too many applications or media and just want to start over from scratch; etc.
By Al Sacco | 15 December, 2010 07:11
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.
By Tony Bradley | 15 December, 2010 07:13
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
It's looking more and more likely that Microsoft Security Essentials (MSE) is warning about a Trojan:DOS/Alureon.J infection when none exists.
By Woody Leonhard | 08 October, 2014 22:30
The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the US payment system to smartcard technology can't happen fast enough.
By Jaikumar Vijayan | 16 August, 2014 20:49
What businesses know about any given individual is a lot. But what are companies doing with that data? Not as much as you might think -- at least not yet. Companies are getting more sophisticated, however.
By Robert L. Mitchell | 06 August, 2014 01:33
Getting employees to take security seriously can be a game that everyone wins.
By Lamont Wood | 17 July, 2014 14:05
Whitepapers about security
Cyber Attacks are painful and destructive. It’s essential to defend your business with a powerful protection system. In this whitepaper, you’ll learn how to get cyber resilient and safeguard your data: • Find out which questions you should ask to find a security solution that works with your business • Understand why your business is a bigger target than you thought • Learn how to protect your brand and bottom line by quickly detecting and responding to attacks
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
- FTClient Service Director - Search: SEO & PPCNSW
- FTStudio Design ManagerVIC
- FTDigital Marketing CoordinatorNSW
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTDigital Performance Manager - MediaNSW
- FTSenior SEO ManagerNSW
- FTAccount Manager - DataNSW
- FTChief Information Officer - CSIROACT
A healthcare organization’s small application management staff must ensure high availability and fast delivery of thousands of critical administrative and clinical applications. See what they did to meet those goals.
- Pirate Bay co-founder sentenced to 3.5 years imprisonment in Denmark
- Google to kill off SSL 3.0 in Chrome 40
- BlackBerry upgrades BBM with timed messages
- NASA puts finishing touches on its first Mars-bound spacecraft
- Facebook sets up shop on the Tor anonymity network
- Sharp smartband LCD uses 1,000 times less power
- HP's move into 3D printing will radically change manufacturing
- Hungary ditches Internet tax plans after protests
- Sony's new mobile chief has hands full as handsets struggle
- IBM joins Tencent to target China's growing enterprise cloud market
- Samsung attacks Chinese rivals with new mid-range Galaxy phones
- FCC's Wheeler said to mull hybrid approach to net neutrality
- Some Aussie businesses using DevOps to improve customer engagement and reduce IT spend: report
- The Google shakeup continues: Andy Rubin is out
- Google project aims to preserve privacy when collecting software stats