Security

Infosec 2010: Experts Overlook Motivation For Cyber-Attacks

Organisations focus more on preventing attacks and dealing with the aftermath than investigating their origins, say experts

14 years ago

Infosec 2010: Trust Will Drive Security Moves, Says PWC

Blurred boundaries will drive new dangers and new opportunities in information security, according to a report from PriceWaterhouseCoopers

14 years ago

Infosec 2010: Data Watchdog Pushes For Prison Sentences

The ICO wants professional data thieves to be jailed but could face opposition to the plan from the next government

14 years ago

UK Cyber Security Challenge Launched To Promote Skills

Autumn will see a Cyber Challenge in the UK, designed to create new security professionals

14 years ago

Bring On The Security Olympics!

Infosec opens today, and as if that wasn't exciting enough, we have a Cyber Security Challenge to look forward to,…

14 years ago

Apple iPad Users Targeted By Malware

Updated: Reports of a first "iPad virus" turn out to be simply a phishing email aimed at Windows users with…

14 years ago

Firms Allege McAfee Lied, While Consumers Get A Refund

Businesses wait for a response over McAfee's false positive, while consumers are offered a cash reimbursement

14 years ago

Authorisation: Why Social Media Needs OAuth

The cloud needs safe information sharing, not old-fashioned identity management - and that's where the OAuth protocol comes in

14 years ago

Facebook ‘Like’ Plug-in Sparks Privacy Concerns

Facebook's new social software tools could help it colonise the web, but pundits are debating the privacy implications

14 years ago

Microsoft Pulls Windows 2000 Server Patch

Microsoft has pulled support for a security patch update that was supposed to fix a critical vulnerability on Windows 2000…

14 years ago

NHS Computers Hit By Qakbot Infection

Is there a doctor in the house? Computer systems at the NHS have been infected by a botnet which Symantec…

14 years ago

Good IT Security Relies On Remedial Services

The value of conventional password policies is doubtful; users will always be the weakest link in IT security, says PJ…

14 years ago

McAfee Update Fiasco Should Serve As A Warning

The controversy created by McAfee's buggy antivirus update should encourage organisations to consider a staged approach to updating computers, says…

14 years ago

Caution Urged On AV Updates Following McAfee Bug

Organisations to consider a staged approach to updating computers in the wake of the McAfee update fiasco

14 years ago

Burglars Take Tory Liam Fox’s Laptop

'Crime is down' says Labour. 'No it isn't,' says Liam Fox, who lost his laptop and car in a break-in…

14 years ago

Review: Proofpoint Makes Encryption Easier

Proofpoint's Protection Server operates either as a web service or as a hardware appliance that can be installed on the…

14 years ago

Details Of iPod-Scanning Law Published

ACTA won't allow devices to be searched or push the concept of a three strikes rule for file-sharers, according to…

14 years ago

McAfee Cockup: Apologies Are Not Enough

A McAfee mistake has crippled Windows XP systems round the world. Users will want redress, and will look for alternatives,…

14 years ago

McAfee Update Breaks Windows XP Systems

PCs running Windows XP have been brought to a standstill worldwide after McAfee VirusScan Enterprise issued a false positive

14 years ago

Physical Loss Or Theft Still Main Reason For Data Breaches

The physical theft or loss of a device containing corporate information is the largest single reason for data breaches, the…

14 years ago

Sophos Charters Boeing 737 To Rescue Staff

The travel fallout from the volcanic eruption in Iceland continues: Sophos resorted to chartering a plane to rescue stranded staff,…

14 years ago

Google Exposes Government Censorship Requests

Government watchdogs accuse Google of disregarding privacy... while Google reveals which governments are asking it for user information

14 years ago

Budget Pressure Leads To Access Control Problems

A new survey has found that companies are struggling to manage access control systems as they try and cope with…

14 years ago

Illegal File-Sharing Only Option For Some, Says EC

Content providers and governments are failing to offer European consumers legal channels to download music while punishing them for illegal…

14 years ago

Reports Emerge Of Google Password Attack

The New York Times is reporting the attack on Google in December hit the company's password system

14 years ago

Panda Launches Cloud Security Protection

Small to medium-size businesses can now gain peace of mind for their cloud systems, after Panda Security announced a cloud-based…

14 years ago

Facebook: Cyber-Bully Or Cyber-Victim?

CEOP is bullying Facebook to display its button. Peter Judge would side with the social networking site, if he didn't…

14 years ago

Facebook Denies Web Tracking Accusations

Facebook claims that data it collects from its new "Like" feature will not be used for behavioural ad targeting

14 years ago

Data Watchdog To Discuss £550k Fines At Security Show

More details of powers granted to the ICO will be discussed at the Infosecurity Europe conference

14 years ago

Adobe Mulls Changes To Reader Amid Malware Threat

Adobe is still discussing what to do about software being exploited by attackers to infect users with the Zeus Trojan

14 years ago