TITUS,the leading provider of security and data governance solutions,is offering Australian government customers a version of TITUS Message Classification that will assist them in easily complying with the most recent version of the ...
Tags: TITUS, security and data governance solutions, Australian government
RIA Novosti reported that Estonia denied Nord Stream’s request to study areas of the Baltic Sea bed falling within the nation’s commercial waters. In August, the pipeline’s operator requested official permission from the ...
Tags: integrated twin pipeline system, gas, pipeline's operator
IDG News Service-Japan's space agency said Friday that sensitive information on a new long-range rocket project may have been stolen by a computer virus. The Japan Aerospace Exploration Agency,or JAXA,said it found evidence that a single ...
Tags: space agency, Virus, Space Rocket Data, Japan
Samsung Electronics will close a security hole in the firmware of some of its printers by issuing an update on Friday,and said they could be protected by disabling SNMP. The affected printers have a backdoor administrator account ...
Tags: Samsung Electronics, close a security hole, printers, SNMP
The private sector's failure to adapt to the demands of social media poses a threat to the bottom line and creates a risk of reputational damage, according to data released by KPMG. A survey of more than 1,000 business executives revealed ...
Tags: social media, KPMG, inadequate responses, customer satisfaction
The National Transportation Safety Board in the U.S.plans to drop the BlackBerry smartphone from Research In Motion for Apple's iPhone,citing performance issues. The iPhone 5 smartphone will replace the NTSB's existing BlackBerry ...
Tags: BlackBerry, Apple's iPhone, NTSB, transfer
NASA is scrambling to implement full disk encryption on agency laptops after one containing unencrypted personal information on a"large"number of people was recently stolen. Agency employees were told of the October 31 theft of the ...
Tags: NASA, Encrypt Laptops, Laptop, sensitive data, personal information
Globally,almost half(46%)of enterprise information is being stored outside of its own datacentre,with 23%stored on the cloud as mobile computing and cloud services go mainstream,according to the State of Information Report 2012 from ...
Tags: Symantec, enterprise data, datacentre, mobile devices, cloud
The number of consumer smartphone and tablets brought into workplaces will more than double by 2014, according to a recent study, but security on the endpoints is lacking. Juniper Research claims the number of devices being used in the ...
Tags: BYOD devices, smartphone, tablets, mobile devices
About 200 Android applications hosted on Google Play create spoofed SMS messages on the devices on which they are installed,according to security researchers from antivirus vendor Symantec. This technique can theoretically be used for SMS ...
Tags: Android applications, Google, SMS
Huawei has admitted to working closely with government security arm GCHQ as part of the agency's ongoing review into the Chinese kit-maker's security practices. Tim Watkins,Western Europe vice-president at Huawei,said GCHQ was monitoring ...
Tags: Huawei, GCHQ, kit-maker's security practices, national security
While the risk of being hacked,conned or having sensitive information stolen is possible all through the year,most security experts agree that the holiday season brings a spike in fraudulent activity,both online and off. CSO compiled a ...
Tags: Christmas, Fraudulent auction, payment sites
Barnes & Noble has removed PIN pad devices from all of its nearly 700 stores nationwide as a precaution after detecting evidence of tampering with the devices at 63 of its stores in eight states. It a statement Wednesday, the company ...
Tags: PIN pad devices, data breach, pad device, PIN pads
Cross-site scripting(XSS)attacks remain the top threat to web applications,databases and websites,an analysis of 15 million cyber attacks in the third quarter of 2012 has revealed. Other top attack techniques are directory traversals,SQL ...
Tags: XSS, Web Applications, CSRF, Cross-site attacks
Google's Android mobile operating system(OS)is under siege by attackers,with malware and information stealing adware targeting the platform up 483%in the last quarter. While Apple's relatively rigorous approach to vetting apps before ...
Tags: Google Android OS, Attackers, open platform, Android apps