Security experts believe passwords offer little or no protection from unauthorised access to corporate IT systems and online accounts, and now Intel is working on an alternative. An increasing number of data breaches are being blamed on ...
Tags: Intel, unauthorised access, IT systems, online accounts
Two security researchers claim to have developed a new attack that can decrypt session cookies from HTTPS (Hypertext Transfer Protocol Secure) connections. Websites use session cookies to remember authenticated users. If an attacker gains ...
Tags: Data Center, HTTPS, computer security, security research
Malware is able to infect other malware and in some cases make it easier for anti-virus software to detect,an incident response investigation by data-security firm Trustwave Spiderslabs has discovered. The research looked at two pieces of ...
Tags: malware, data security, Trustwave Spiderslabs, Trojan, virus
Nearly half of enterprises that allow employee-owned devices to connect to a company's network have experienced a data breach, a study has revealed. Most of these companies reacted by restricting data access rights (45%) or installing ...
Tags: employee-owned devices, company's network, data breach, security software
Computerworld-Microsoft last week warned IT administrators that critical vulnerabilities in code licensed from Oracle could give attackers access to Exchange Server 2007 and Exchange Server 2010 systems. Oracle patched the vulnerabilities ...
Tags: Oracle code, critical vulnerabilities in code, Oracle patched, Exchange
Security researcher Jonathan Brossard created a proof-of-concept hardware backdoor called Rakshasa that replaces a computer's BIOS (Basic Input Output System) and can compromise the operating system at boot time without leaving traces on ...
Tags: Hardware, Basic Input Output System, computer technology, Brossard
The government is hoping to shore up its defences against cybercrime through post-graduate training,and has asked universities to apply for funding to run training courses for post-graduates. Through the Engineering and Physical Sciences ...
Tags: cybercrime, post-graduate training, training courses, EPSRC
Chinese and Hong Kong Police have smashed a gang blackmailing gold,silver and securities traders with the threat of distributed denial-of-service(DDoS)attacks. The cross-border cyber policing operation netted six suspects in ...
Tags: China, DDoS attacks, gang blackmail, Chinese and Hong Kong Police