“Collecting more and more unstructured data will open up another whole degree of attractiveness and may well lead to attackers seeing value in a form not previously recognised by the organisation that owns the data.” So ...
Kaspersky Lab has revealed research results that show an increase in malware in the Middle East. The data, provided by Kaspersky Security Network, reveals that The UAE had the highest rate of attacks in the region, suffering 34% of all ...
Tags: Computer Products, Kaspersky, software
The cyber-extortionists behind the Cryptolocker "ransomware", which encrypts users' files and refuses to decrypt them without payment, have extended their deadline for affect PC users. Cryptolocker uses 256-bit Advanced Encryption ...
Tags: Computer Products, web surcrity
As anticipated, the latest round of Microsoft’s Patch Tuesday monthly release of security fixes addresses a widely known Internet Explorer (IE) vulnerability already being exploited by malicious hackers. Overall, for October’s ...
Network Solutions is investigating an attack by a pro-Palestinian hacking group that redirected websites belonging to several companies. Owned by Web.com, Network Solutions registers domain names, provides hosting services and sells other ...
Tags: DNS Hijack, Network Solutions
Google chairman Eric Schmidt has claimed that Android smartphones have better security than that of Apple's iPhone. Schmidt made the statement at Gartner Symposium/ITxpo in Orlando, Florida during a question and answer session following a ...
Tags: Computer Products, Google
Kaspersky has discovered 'Icefog', a hacking campaign that targets the supply chains of Western companies, a report by the security and anti-virus software solutions provider has revealed, as it warns about the growing threat of ...
Tags: Kaspersky, software, Computer Products
Apple's new iOS 7.0 operating system "doesn't address the dangers" in malicious apps, and Apple has supplied scant details on new anti-virus and anti-malware features in its new mobile operating system, according to application security ...
Tags: Computer Products, Apple, iOS 7.0
Editor's note: Just in time for pre-Interbike reading, BRAIN's longtime legal analyst, Steve Hansen, takes a look at the implications of recent employer liability cases involving hosting parties where alcohol was served or was present. ...
Tags: Transportation
Oracle added a feature in Java that lets companies control what specific Java applets are allowed to run on their endpoint computers, which could help them better manage Java security risks. The new feature is called the "Deployment Rule ...
Tags: Computer Products, software
With its $7.2 billion agreement to buy Nokia’s handset business, Microsoft is in a position to surpass Apple and Android smartphone makers in providing an enterprise-class mobile platform, experts say. However, whether Microsoft is ...
Tags: Nokia, Mobile Enterprise
The New York Times website was unavailable to its readers yesterday afternoon in the US, after a cyber attack on the organisation's web host, Melbourne IT. Twitter, which uses Melbourne IT as a domain name registrar, was also affected by ...
Tags: Computer Products, webservice
Rapid 7 this week unveiled a new set of tools designed to help businesses better judge the overall effectiveness of existing security controls and the risk associated with users across the organization. The announcement came during ...
Tags: Rapid 7, software, Computer Products
Although cyberattacks caused just 6 percent of significant outages of public electronic communications networks and services in the E.U. last year, they affected more people than hardware failure, a much more common factor in service ...
Tags: Computer Products, webservice
A malicious software tool perhaps most famously used to hack RSA's SecurID infrastructure is still being used in targeted attacks, according to security vendor FireEye. Poison Ivy is a remote access trojan (RAT) that was released eight ...
Tags: Computer Products, software