"The number of fronts of risk and war, as some people call it, are definitely multiplying," says Clinton McFadden, senior operations manager for IBM X-Force research and development, which just released the results of its X-Force 2012 ...
Tags: Cyberwarfare, Trend and Risk Report., IBM, US
The value of data to cyber criminals Plan for cyber attacks Defence in depth against cyber attack Comprehensive approach to APTs Stuxnet,Duqu,Flame,and Gauss have nothing to do with businesses that are not involved in finance and critical ...
Tags: cyber criminals, cyber attack, OTMS, IT security
A flaw found in Apple's iPhone that can allow text messages to sidestep Apple's safeguard is"severe",according to an iPhone security researcher. In a blog post,the researcher,named Pod2g,said that the issue could mean that cyber criminals ...
Tags: iPhone SMS security flaw, iPhone security researcher, blog post Pod2g
Computerworld Hong Kong - Apple's iCloud service, which was recently forced upon former-users of mac.com (including myself), has not proven to be a shiny seamless service. Many tech journos complain that iCloud doesn't represent the ...
Tags: Hong Kong, Apple's iCloud, service
Infoworld - When it comes to IT security, FUD (fear, uncertainty, and doubt) is more than just the tool of overhyping vendors hoping to sell their next big thing. It is the reality that seasoned IT security pros live in, thanks in large ...
Tags: IT security, FUD, Paul Ferguson, antivirus scanner
A new Web-based social engineering attack that relies on malicious Java applets attempts to install backdoors on Windows, Linux and Mac computers, according to security researchers from antivirus vendors F-Secure and Kaspersky Lab. The ...
Tags: Desktop Apps, US, engineering attack, electronic technology