security - News, Features, and Slideshows
- How to fix the two-factor authentication log-in error in Gmail on Android
- How to fight back against CryptoLocker
- Malicious advertising hits Amazon, YouTube and Yahoo, Cisco says
- Just five gangs in Nigeria are behind most Craigslist buyer scams
security in pictures
The U.S. Congress is unlikely to pass legislation to end the National Security Agency's widespread collection of U.S. telephone records before leaving Washington, D.C., on a two-month break.
By Grant Gross | 17 September, 2014 06:29
It has been a summer of discontent for the Android security community, as a host of vulnerabilities large and small has arisen to plague the world's most popular mobile OS. The revelation this week of a cross-site scripting flaw in the default browser installed on large numbers of pre-version 4.4 Android devices is merely the latest entry in a list that makes for unsettling reading.
By Jon Gold | 17 September, 2014 05:33
A U.S. appeals court has thrown out a US$368.2 million award against Apple in a patent infringement case brought by patent-holding and software company VirnetX.
By Grant Gross | 17 September, 2014 05:17
Cisco is bringing technology obtained through last year's acquisition of Sourcefire to its firewalls to enable threat-focused security for enterprises.
By Jim Duffy | 16 September, 2014 23:22
The default browser in Android versions older than 4.4 has a vulnerability that allows malicious websites to bypass a critical security mechanism and take control of a user's authenticated sessions on other sites.
By Lucian Constantin | 16 September, 2014 22:43
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry for a new one from your wireless carrier; you and a friend are swapping devices; you loaded too many applications or media and just want to start over from scratch; etc.
By Al Sacco | 15 December, 2010 07:11
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.
By Tony Bradley | 15 December, 2010 07:13
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the US payment system to smartcard technology can't happen fast enough.
By Jaikumar Vijayan | 16 August, 2014 20:49
What businesses know about any given individual is a lot. But what are companies doing with that data? Not as much as you might think -- at least not yet. Companies are getting more sophisticated, however.
By Robert L. Mitchell | 06 August, 2014 01:33
Getting employees to take security seriously can be a game that everyone wins.
By Lamont Wood | 17 July, 2014 14:05
Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.
By Jaikumar Vijayan | 27 June, 2014 04:58
Whitepapers about security
A growing number of organisations are using off the shelf technologies to stretch application processing and data access for continuous application and availability. This paper describes how deployment models for applications work. Enterprises are consolidating high availability and data recovery practices and technologies to achieve continuous availability that provides users with uninterrupted access to data and applications The right solution provides data coherency across distance for simultaneous access to the same data in multiple locations Organisations need to be able to trust that the data and applications it depends on will continues to be available and operate, through both planned and unplanned outages
BIG-IQ Security makes it easy to manage the entire firewall policy life cycle. Read about the key benefits and download the policy auditing and security compliance report today
- FTMedia Planner Buyer - Media Trader OpportunitiesNSW
- FTSearch Account ManagerNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTCampaign Managers| RTB / Programmatic | Expression of InterestNSW
- FTSenior Media TraderNSW
Mobile devices present a unique dilemma to the enterprise. On the one hand, workers empowered with tablets and smartphones can transform the way they do business; they’re more agile, closer to customers and more productive. Bring Your Own Device (BYOD) programs give users the freedom to work on the devices of their own choosing, while still allowing an enterprise to reap the productivity benefits of these always connected, readily accessible mobile devices.
- In Pictures: In memoriam - Apple's iPod through the years
- Jive adds Office 365 connectors for its enterprise social suite
- IBM Watson Analytics preps the data so you don't have to
- Microsoft adds 3D printing via Cloud to application
- Apple likely to release iOS 8 at 1 p.m. ET, 10 a.m. PT Wednesday
- NSA reform bill stalled with Congress headed toward fall recess
- Lyft car-pooling opens in LA despite regulatory challenge
- Browser vulnerability caps rough few months for Android security
- Samsung flexes enterprise muscles with Tab Active and Knox
- SpaceX, Boeing may work together on US space flight program
- US court throws out $368.2 million patent award against Apple
- Appeals court tosses $368M patent judgment against Apple
- Software bugs most common cause for mobile Internet outages, study says
- FCC gets record number of net neutrality comments, what now?
- Subway to accept NFC payments starting in October