It's been billed by its organizers as the most important day for the future of the Internet, but so far World IPv6 Day has probably served to confirm what the industry already knows about the 128-bit protocol on which the 21st century digital society will be built -- there is not a lot of it about.
Stories by John E. Dunn
The U.K. Government is developing a "toolbox" of Internet cyber-weapons that could be used to attack other countries, Armed Forces Minister Nick Harvey said in an admission that the military now treats the Internet as a battlefield like any other.
Large numbers of companies using Cisco network equipment are still vulnerable to a single security vulnerability flaw nearly two years after a patch was issued, an analysis of network scans by Dimension Data for its 2011 Network Barometer Report has found.
Three years after its founding, the Industry Consortium for Advancement of Security on the Internet (ICASI) is starting to bear fruit with the launch of version 1.0 of its framework designed to allow tech vendors to more easily share data on software vulnerabilities.
The U.K.'s obsolete copyright laws are hurting innovation and should be overhauled to boost economic growth and make it easier for content and creative businesses to set up in the country, an independent report has recommended.
Four out of the five vendors shown last month by testing company NSS Labs to suffer a security flaw in their high-end firewalls have since patched their products, including two companies that disputed the issue at the time.
The WebGL graphics technology turned on by default in Firefox and Chrome poses a serious security risk and IT managers should consider disabling it, a security consultancy has recommended.
The latest Appcelerator/IDC mobile survey has uncovered a growing well of frustration among Android developers, with underwhelming tablets, OS fragmentation and multiple app stores cited as the main worries.
Open-source security company Sourcefire has announced an entry-level Intrusion Prevention System (IPS) it claims will democratize a technology that is still seen as being exclusively for large companies with experienced security teams, rather than small and medium-size enterprises.
Can UTMs evolve beyond their powerful but sometimes rather limited roots? According to newcomer, Cyberoam, the next stage lies with identity-based management, a dry-sounding way of saying that security is about monitoring real individuals and not necessarily treating all users as representing the same risk.
Google has started using its next generation plug-in API to embed support for Adobe Acrobat PDFs more deeply into the Chrome browser. The company believes this will benefit security, performance and reliability.
With spam volumes rising relentlessly a new survey claims to have detected an iota of worry among service providers. It seems many of them would love to do something about it but don't know what.
The rumours that Apple wants to buy high-rated UK chip supplier ARM have returned with dramatic effect.
Panda Security has bolstered the features available in its free antivirus product, Cloud Antivirus, adding a new behavioural engine and Windows autorun control.
Cambridge scientists have come up with a simple way to generate the entangled photons needed by quantum computers using a cheap light emitting diode (LED) powered by electrical voltage.