Security

Facebook Threatens Lawsuit Against Daily Mail

Facebook is threatening to sue the Daily Mail, after the newspaper published an article suggesting children who used the site…

14 years ago

RSA: Feeding Security Into The Cloud

The RSA conference seeks to use lessons from single-tenant data centres to build security into cloud computing infrastructures. But what…

14 years ago

Twitter Takes On Malware With Link Scanning Tools

Twitter has announced it will begin scanning links posted by users to thwart phishing attacks and the spread of malware…

14 years ago

Fasthosts Debuts Virtual Server Range

Fasthosts targets UK firms’ growing appetites for virtual server solutions, featuring Hyper-V technology and customisable RAM, CPU and disk space

14 years ago

Microsoft Issues Patch Tuesday IE Warning

The company warns that attackers are targeting a vulnerability in Internet Explorer that can be used to hijack machines

14 years ago

Dell Powers New Laptops, Workstations With Latest Intel Chips

New lineup of Dell Vostro laptops feature Intel Core i7 processors and high-end M4500 workstation is first to combine Nvidia…

14 years ago

Data Centre Management Costs Continue To Grow

Despite increased automation capabilities, IDC points to a range of data centre approaches that are driving higher management spending

14 years ago

Investigation Continues Into Malware In Battery Charger Software

A Trojan hidden within software for the Energizer Duo USB battery charger may have been around since May 2007, according…

14 years ago

Cloud Continues To Confuse UK Businesses

Almost a quarter of industry professionals are unable to define cloud computing, but will a new industry forum’s code of…

14 years ago

Protecting Your Critical Infrastructure

As the government prepares to launch its Cyber Security Operations Centre, Reed Henry of ArcSight discusses the importance of protecting…

14 years ago

Review: Google Apps Premier Provides Mobile Device Management

Google Apps Premier and Education editions allow companies to enforce security and policy controls over some ActiveSync-enabled mobile devices in…

14 years ago

Microsoft Patch Tuesday To Offer Office Fixes

Microsoft is planning two security updates for Patch Tuesday to address eight vulnerabilities, and reminded users it is terminating support…

14 years ago

Google Steps Up Data Protection With Synchronous Replication

Files stored in Google Docs or in Gmail are broken up into digital pieces and stored on random servers for…

14 years ago

RSA – Russian Banking Trojan Unmasked

The details of a Russian botnet that targets Russian banks instead of Western victims has been revealed at the RSA…

14 years ago

Google China Hack Stole Source Code

A security researcher believes that the Chinese hackers responsible for the Google attack managed to steal valuable source code

14 years ago

Greenpeace Admits Using ‘Dirty’ Power

Greenpeace has admitted that its hosting operations are powered by coal and nuclear power, after it criticised Facebook for building…

14 years ago

Data Watchdog: Privacy Must Not Be An Afterthought

The ICO has released a new report which includes tools to help enterprises argue a business case for data protection

14 years ago

RSA: US Defence Experts Discuss Security Versus Privacy

Former US Secretary of Homeland Security Michael Chertoff and former Bush administration cyber-security advisor Richard Clarke laid out the privacy…

14 years ago

RSA: Sophos Warns On Social Networking Scams

Sophos security expert Graham Cluley outlined some of the main threats targeting Facebook, Twitter and other social networking sites

14 years ago

US Considers WTO Option For Google China Dispute

Google's dispute with China shows no sign of diminishing, after the search engine giant suggested that the issue should be…

14 years ago

Spanish Police Arrest Mariposa Botnet Masterminds

Three men allegedly responsible for the virulent Mariposa botnet have been arrested by Spanish investigators

14 years ago

Security Researchers Analyse Google China Botnet

Researchers have uncovered evidence that the botnet behind the infamous attack on Google in 2009 was active months before the…

14 years ago

Microsoft Says IE8 Compatible With More Websites

Microsoft has issued an official blog post detailing its engineers’ thinking process behind the build of Internet Explorer 8, the…

14 years ago

RSA: US Cybersecurity Plan Declassified

At the RSA Conference, White House Cyber-Security Coordinator Howard Schmidt announced that an unclassified version of the Obama administration's “Comprehensive…

14 years ago

Switch Off Laptop Wi-Fi To Prevent Theft, Warns Credant

Security specialist Credant has warned users to turn off their laptop's Wi-Fi signals, as thieves can easily locate the devices…

14 years ago

Microsoft Warns Of Zero-Day Flaw For Old Windows Machines

Microsoft has issued a security advisory after warning of a security hole caused by an unpatched zero-day flaw on older…

14 years ago

Pentagon Relaxes Facebook, Twitter Regulations

American troops can now use social networking sites to help them stay in touch with friends and family whilst serving…

14 years ago

If You Can’t Beat Malware, Tunnel Through It

Trusteer's methods of tackling malware have seen it clash with other established security specialists. The company's CEO Mickey Boodaei answers…

14 years ago

IPCC Responds To Climategate Email Hack

The UN's Intergovernmental Panel on Climate Change (IPCC) has said an independent panel of scientists would be appointed to review…

14 years ago