The New York Times blamed a prolonged website outage on Tuesday on a hacking attack at the company's Australia-based domain name registrar, Melbourne IT. A story published by The Times on Tuesday afternoon quoted the company's CIO, Marc ...
Tags: Computer Products, IT
In new jobs after graduating from university, Eric Perriard and Tom Wright found their employers could articulate grandiose strategies for their businesses. But there was little connection to how the average employee could help out. ...
Tags: Computer Products, software
A malicious software tool perhaps most famously used to hack RSA's SecurID infrastructure is still being used in targeted attacks, according to security vendor FireEye. Poison Ivy is a remote access trojan (RAT) that was released eight ...
Tags: Computer Products, software
Cisco Systems has released new security patches for several versions of Unified Communications Manager (UCM) to address vulnerabilities that could allow remote attackers to execute arbitrary commands, modify system data or disrupt services. ...
Tags: Computer Products, software, Electrical, Electronics
As Windows 8 struggles to take off, Microsoft has decided to hire a new ad agency to handle the digital promotion of both the operating system and Microsoft Surface tablets. The company has awarded the contract to Razorfish, according to ...
Tags: Windows 8, Computer Products
With an update to its Foglight for Virtualisation software package, Dell can now help organizations rid their systems of resource-sucking zombie virtual machines.? "It's so easy to create VMs. We have customers creating thousands and ...
Tags: Foglight, DELL, Computer Products
IBM is to acquire security firm Trusteer, whose software aims to help protect organisations against financial fraud and advanced security threats. Financial terms were not disclosed. Further reading IBM acquires cloud computing firm CSL ...
Tags: IBM, Financial Security
Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps. The ICS ...
A variety of network-controlled home automation devices lack basic security controls, making it possible for attackers to access their sensitive functions, often from the Internet, according to researchers from security firm Trustwave. ...
Tags: Computer Products, softwre
USERS of Linux who subscribe to the online forums of popular strain Ubuntu have been urged to change their passwords after hackers stole up to 1.82 million user names and passwords. This especially applies to Linux users who use the ...
Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organisations because most of them have outdated versions of the software ...
Tags: Java, soft security, software, Computer Products
A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal. Due to metrics and basic job requirements, end user and network ...
Tags: Computer Products, software
Security researchers from Polish vulnerability research firm Security Explorations claim to have identified a new vulnerability in Java 7 that could allow attackers to bypass the software's security sandbox and execute arbitrary code on the ...
Tags: Computer Products, software
Wall Street played its own version of war games on Thursday, testing its defences against simulated cyber-attacks bent on taking down US stock exchanges. A total of 500 people took part in the exercise, called Quantum Dawn 2, in offices ...
Tags: Wall Street, Computer Products
The Chinese cyber-spies behind the widely publicised espionage campaign against?The New York Times?have added Dropbox and WordPress to their bag of spear-phishing tricks. The gang, known in security circles as the DNSCalc gang, has been ...
Tags: Computer Products, software