BIG business is being targeted by cyber-criminals in "ransomware" attacks, threatening deletion or freezing of crucial business files unless money is paid. A new national survey of Australian big business reports that in September last ...
Tags: TriQuint, IT security, firewalls
A report released National Audit Office revealed that the UK IT skills shortage means that Britain could have trouble defending itself from cyber attacks over the next 20 years. The UK was hit by over 40 million cyber attacks in 2011 ...
Tags: National Audit Office, UK, IT industry
Constant Guard Mobile Helps Protect Xfinity Internet Customers While They Browse, Shop and Bank Online On-The-Go To address growing security threats to consumers’ mobile devices, today Comcast announced it has launched Constant ...
Tags: Mobile devices, Constant Guard Mobile, security threats
The UK's critical infrastructure is open to cyber-attacks because of a lack of experts able to thwart threats, warns a report by the National Audit Office (NAO). One year on: The UK Cyber Security Strategy UK military unprepared for ...
American Express (Amex) has synced with Twitter to enable its cardholders to tweet specific hashtags to purchase products online. Amex's technology, dubbed Card Sync, had initially been launched in March 2012 to deliver couponless savings ...
Tags: American Express, Twitter, specific hashtags
27 million new malware strains found in 2012, at an average of 74,000 new samples per day BERKSHIRE, ENGLAND, February 08, 2013 /24-7PressRelease/ -- PandaLabs, the antimalware laboratory of Panda Security, has released its 2012 Annual ...
In a security landscape report released on Tuesday, security software maker F-Secure claimed that 2012 was the "year of the exploit". F-Secure, which focused on cyber threats during the second half of 2012, noted that the Internet has ...
Tags: security software, Internet, Web
Google chairman Eric Schmidt has labelled China a menace to the internet, complicit in the use of cyber-crime as part of efforts to undermine its corporate and political opponents. The claims are made in his upcoming book, The New Digital ...
Tags: Google, cyber-crime, China, cyber security
A quarter of a million Twitter accounts have been compromised by hackers, according to the social network. This follows similar attacks on the Wall Street Journal and the New York Times in the last two weeks. Analysis: Why Twitter may ...
Tags: Twitter, social network, cyber security
Cyber criminals have moved beyond the traditional PC, targeting Android, social media and even the Mac OS X with new attacks, according to Trend Micro’s 2012 Annual Roundup and Mobile Security reports. Malware targeting Android alone ...
Tags: cyber criminals, traditional PC, Android, social media
Java's new security settings, designed to block "drive-by" browser attacks, can be bypassed by hackers, a researcher announced Sunday. The news came in the aftermath of several embarrassing "zero-day" vulnerabilities, and a recent ...
Tags: Bug, Moot Java, Anti-Exploit Defense
US law enforcement has announced charges against three alleged East European cyber thieves accused of stealing banking information from computers across Europe and the US, including at the space agency NASA. The "alleged international ...
Tags: computers, global cyber theft, cyber thieves
Oracle’s bad Java week got worse on Wednesday, after it was announced that a previously unknown flaw in the programming language still threatens the security of millions of PCs. This is despite the fact that Oracle issued an emergency ...
Tags: Oracle, bad Java, unknown flaw
Following Google’s recent upgrade of Chrome, a new wave of bogus updates has been set upon the Internet by cyber criminals looking to steal online banking credentials and cause other problems for users. Google released its upgrade ...
Tags: Google, Chrome, cyber criminals, Internet
The UK Defence Committee is urging the Government to be more vigorous in its approach to cyber threats. A new report released by the Committee says that the British military is now too dependent on information and communications ...
Tags: military, IT, cyber threats, information, communications technology