Travelers has introduced new CyberFirst Essentials - Small Business coverage to offer small businesses insurance for common information breaches. The new coverage will also help small businesses to safeguard against this rapidly growing ...
Tags: cyber protection, cyber insurance, monitoring services
Google thinks it might have found an answer to the vexing problem of forgotten or weak passwords: "physical" passwords, which might come in the form of a piece of jewelry such as a ring. In a research paper, two of its engineers write ...
Tags: Google, passwords, hijacking, online accounts
The American Institute of Architects (AIA) has selected the 2013 recipients of the Institute Honor Awards, the profession’s highest recognition of works that exemplify excellence in architecture, interior architecture and urban ...
Tags: AIA, Architects, 2013, Honor Awards
Unidentified attackers stole sensitive information from hundreds of diplomatic, government, research and military organizations from around the world as part of a newly uncovered cyberespionage campaign that started nearly six years ago. ...
Tags: attackers, sensitive information, cyberespionage campaign
A cyber espionage network has been allowed to flourish in Eastern Europe, former Soviet republics and Central Asian countries since 2007, security firm Kaspersky Lab reported this week. The group, called Red October, has been stealing ...
Tags: cyber, espionage network, Eastern Europe
Cloud service providers will seek out partnerships to offer a wider breadth of services that customers are increasingly demanding, a new report from research firm Current Analysis predicts. The market has already seen some partnerships, ...
Tags: cloud service, Current Analysis, software, computing
The UK Defence Committee is urging the Government to be more vigorous in its approach to cyber threats. A new report released by the Committee says that the British military is now too dependent on information and communications ...
Tags: military, IT, cyber threats, information, communications technology
Mobile application developers should minimize privacy surprises for their customers by limiting their data collection and retention and giving users access to the data collected,California Attorney General Kamala Harris has recommended. ...
Tags: Mobile apps, Mobile application developers, privacy policies, Harris
Security researchers from antivirus vendor Trend Micro have uncovered a piece of backdoor-type malware that infects Java-based HTTP servers and allows attackers to execute malicious commands on the underlying systems. The threat, known as ...
Tags: security researchers, Trend Micro, Java, HTTP servers, malware
IDG News Service-Graphics chip manufacturer Nvidia is investigating claims that hackers have compromised its online stores as part of a larger attack that affected several of its websites. On Friday,a hacker group calling itself Team ...
Tags: Nvidia Investigates, online stores, hack
Personally identifiable information of "at least" 10,000 NASA employees and contractors remains at risk of compromise following last month's theft of an agency laptop, a spokesman told Computerworld via email Thursday. Agency employees ...
Tags: US, computer security, IT industry, NASA
DENVER, CO, July 28, 2012 /24-7PressRelease/ -- Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or ...
Tags: Computer hackers, computer systems, computer security, Software, iComputer
Printers manufactured by Samsung have a backdoor administrator account hard coded in their firmware that could enable attackers to change their configuration, read their network information or stored credentials and access sensitive ...
Tags: Printers, Samsung, backdoor administrator, firmware
A hacker is selling a$700 zero-day exploit for Yahoo Mail that lets an attacker use a cross-site scripting(XSS)vulnerability to steal cookies and hijack accounts. The hacker,known as"TheHell",created a video to market the exploit on an ...
Tags: hacker, Yahoo mail
If you're watching TV and the channel suddenly changes, you may not have sat on the remote control by accident. Researchers with the security consultancy ReVuln in Malta have found a vulnerability present in most TVs made by Samsung ...
Tags: Samsung, TV, software, malicious software, LED 3D TV