security - News, Features, and Slideshows
- Many Chrome browser extensions do sneaky things
- How to fix the two-factor authentication log-in error in Gmail on Android
- How to fight back against CryptoLocker
- Facebook says most outbound email is encrypted now
security in pictures
Information security spending in Australia will exceed $2 billion next year, according to a Gartner forecast released today.
By Adam Bender | 22 August, 2014 11:12
U.S government agencies will work to release cyberthreat information faster to the health-care industry after a massive breach at hospital operator Community Health Systems, representatives of two agencies said.
By Grant Gross | 22 August, 2014 04:02
Many businesses spend a lot of time thinking about how to retain and store data, but there's another idea: Think about how to destroy your data.
By Ellen Messmer | 22 August, 2014 00:01
With a Microsoft-mandated deadline a little more than two months away, computer makers are still selling PCs equipped with Windows 7 Home Premium.
By Gregg Keizer | 21 August, 2014 20:49
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry for a new one from your wireless carrier; you and a friend are swapping devices; you loaded too many applications or media and just want to start over from scratch; etc.
By Al Sacco | 15 December, 2010 07:11
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.
By Tony Bradley | 15 December, 2010 07:13
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the US payment system to smartcard technology can't happen fast enough.
By Jaikumar Vijayan | 16 August, 2014 20:49
What businesses know about any given individual is a lot. But what are companies doing with that data? Not as much as you might think -- at least not yet. Companies are getting more sophisticated, however.
By Robert L. Mitchell | 06 August, 2014 01:33
Getting employees to take security seriously can be a game that everyone wins.
By Lamont Wood | 17 July, 2014 14:05
Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.
By Jaikumar Vijayan | 27 June, 2014 04:58
Whitepapers about security
Mobile devices are not just another type of endpoint. Inherent features (e.g., camera, accelerometer, proximity sensor, etc.) coupled with the always-connected, readily available nature of these devices represent an opportunity for improvement in enterprise user productivity. Enterprises can begin to realize this potential by allowing use of corporate data in both custom-built and commercially available mobile apps. Mobile workflows resulting from interactions between these apps can be faster and more intuitive than those on a PC. However, the need to always retain control over corporate data should give an enterprise pause before sanctioning the widespread use of sensitive business information on mobile devices.
- FTCampaign Managers| RTB / Programmatic | Expression of InterestNSW
- FTDigital Media PlannerNSW
- FTDigital Account ManagerNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTChief Information OfficerNSW
- FTInformation Services ManagerNZ
Technology has become the heart and soul of every business, but IT workload and system complexity become more challenging. This whitepaper details the future of IT, the major challenges facing CIOs, and the three ways to transform IT so CIOs can lead the way.
- Security spending nears $2 billion a year in Australia: Gartner
- Google's search app gets friendlier to bilingual Android users
- NBN end users approach 100Mbps with FTTN
- Adult content could stimulate virtual reality market
- Cloud computing: Potential, pitfalls for people with disabilities
- Intel highlights more of its wireless computing plans
- Microsoft jumps into NoSQL market with new Azure data store
- Google gets patent to make Glass look like ordinary specs
- Apple updates OS X Yosemite public beta
- NIST taking input for mobile security guidelines
- Oracle CEO Larry Ellison turns 70 with no retirement in sight
- FDA approves tech that turns smartphone into stroke warning system
- Sprint drops second shoe: $60 unlimited voice, text, data plan
- US lawmaker wants to rebrand net neutrality
- US agencies to release cyberthreat information faster to the health-care industry