Security

Microsoft Issues First Security Patch Of 2010

Microsoft is planning to plug a Windows security hole rated critical for Windows 2000 systems, in the company's first Patch…

14 years ago

Cisco Acquires Security Start-up Rohati Systems

Cisco says it has bought Rohati Systems, a company specialising in agentless transaction networking systems

14 years ago

Iomega Offers Virtual PC Clones

Storage provider Iomega is now offering technology that will allow users to keep a virtual copy of their computer in…

14 years ago

Social Networking Suicide Can Be Painful

Security expert condones Facebook's decison to block Web 2.0 Suicide Machine, which deletes profiles from the social networking site

14 years ago

Review: IBM’s Proventia Management SiteProtector

IBM's Rational AppScan and ISS Proventia IPS GX5108 combine proactive application vulnerability scanning with live IPS attack reports to provide…

14 years ago

U2’s Bono Stage Dives Into File-Sharing Debate

The Irish rocker has cited China's clampdown on online free speech as evidence that ISPs could do more to tackle…

14 years ago

EMC Acquires Risk Specialist Archer Technologies

EMC has acquired governance, risk and compliance software maker Archer Technologies

14 years ago

Kingston Admits To Secure USB Drive Flaw

There are red faces over at Kingston after the company admitted that a number of its encrypted USB sticks can…

14 years ago

Symantec Reveals SaaS Plans For 2010

The security company has discussed its plans for the SaaS space in the coming year

14 years ago

Security Holes Discovered In Google Calendar and Twitter

A security researcher uncovered some holes in Google Calendar and Twitter that may allow an attacker to steal cookies and…

14 years ago

TJX Hacker Admits To More Hacking Charges

TJX hacking mastermind Albert Gonzalez is facing a longer stretch in prison after pleading guilty to yet more hacking charges

14 years ago

Microsoft Downplays Concerns Of IIS Zero-Day Bug

Microsoft is attempting to downplay concerns over a security vulnerability in IIS, and insists it would need an insecure configuration…

14 years ago

Security Worries Over Smuggled Mobiles In Prison

The number of illegal mobile phones and SIM cards in prison has trebled in just two years leading to concerns…

14 years ago

Mobile Industry Downplays Cracking Of GSM Code

The mobile industry has downplayed worries that GSM phone users are now vulnerable to having their telephone calls intercepted

14 years ago

Obama Finally Appoints US Cyber-Security Chief

U.S. President Barack Obama has chosen Howard Schmidt to step into the role of cyber-security coordinator

14 years ago

Scareware On The Rise Over 2009 Says FBI

From serving malicious ads to poisoning search engine results for recently deceased actress Brittany Murphy, rogue antivirus operations have been…

14 years ago

Cisco Helps Cops Capture Crooks With Video Cloud

The networking giant's technology is being used to underpin an online evidence repository developed by stun-gun maker Taser International

14 years ago

Illegal File-Sharing Rife In UK, Claims BPI

Illegal file-sharing is as widespread as ever, despite plans for new government legislation to cut off pirates, but Rage Against…

14 years ago

Details Emerge Of Latest Twitter Attack

The attack that took down Twitter on 17 Dec. used legitimate credentials to log in and redirect Twitter.com to a…

14 years ago

UK Government e-Borders Scheme In Disarray

The government's decision to gather personal data on every traveller into and out of the UK is under threat from…

14 years ago

Iraqi Militants Hack US Predator Drones

Militants have hacked Predator drone feeds using software that costs less than $30, but US military officials insist hackers have…

14 years ago

Twitter Hacked By Iranian Cyber Army

Twitter was hijacked between 10pm and 11pm Pacific time on 17 December, and was replaced it by a screen which…

14 years ago

Symantec Targets Mobile Devices With New Offerings

In a sign of the increasing proliferation of mobile devices in the workplace, Symantec has rolled out three solutions in…

14 years ago

Review: Sophos Endpoint Security and Data Protection 9

Sophos Endpoint Security and Data Protection 9 is a solid contender in the enterprise endpoint security market, with strong deployment…

14 years ago

MPs Join Protest Over McKinnon Extradition

The Liberal and Conservative leaders protest outside the Home Office, while the Home Secretary says hacker Gary McKinnon must face…

14 years ago

New Adobe Zero-Day Vulnerability Discovered

More bad news for Adobe after a new vulnerability affecting Reader and Acrobat has been uncovered, with attacks already under…

14 years ago

Europe Talks Tough On Piracy and Copyright

Organised criminals are "freeloading on the ingenuity" of others, according to the European Commission

14 years ago

Analyst Names And Shames Two-Factor Security Failings

Gartner points out where strong two-factor authentication is falling short when it comes to preventing fraud and online attacks.

14 years ago

US And Russia In Talks To Prevent Cyber Arms Race

The US is in talks with Russia and the UN to improve Internet security and prevent the breakout of cyber…

14 years ago

Personal Data At Risk After SQL Flaw Discovered

A SQL injection flaw on a social networking app developer site has compromised the security of users and could lead…

14 years ago