Entrust, Inc. today announced industry-leading updates to its popular mobile smart credential. In addition to offering a multi-purpose digital identity for secure physical, logical and cloud access, the Entrust IdentityGuard Mobile Smart ...
The PostgreSQL developers released updates for all major branches of the popular open-source database system on Thursday in order to address several vulnerabilities, including a high-risk one that could allow attackers to crash the server, ...
Tags: PostgreSQL, Computer Products
Google is reportedly negotiating with messaging app WhatsApp over a possible takeover worth nearly $1bn (£655m) According to an inside source, the negotiations started more than a month ago, says DigitalTrends. Further reading ...
Tags: Computer Products, google, software
Security firm Symantec has found that banking Trojan Shylock – malware which aims to infect computers – is currently targeting more than 60 financial institutions, the majority of which are in the UK. In a blog, the firm ...
Tags: Computer Products, software
Security vendor Sophos has released an update for the software used on its Web gateway security appliance in order to address three serious vulnerabilities in the product's Web-based user interface. The vulnerabilities could allow ...
Tags: Web Security Appliance, Security, Computer Products, web, Security vendor
A federal court in Chicago this week granted class action status to a lawsuit accusing comScore, one of the Internet's largest user tracking firms, of secretly collecting and selling Social Security numbers, credit card numbers, passwords ...
Tags: Computer Products, software
Mozilla on Tuesday shipped Firefox 20, adding more flexible private browsing and patching 13 vulnerabilities, five rated "critical" by the company's security team. Along with the privacy change, Mozilla also revamped Firefox's download ...
Tags: Firefox, software, Computer Products
A piece of malicious software spotted by Trend Micro uses the note-taking service Evernote as a place to pick up new instructions. The malware is a backdoor, or a kind of software that allows an attacker to execute various actions on a ...
Tags: Computer Products, softare
Apple this week followed the lead of rivals like Facebook, Google and Microsoft, offering two-step authentication to help customers secure their Apple IDs against hacking. The new feature is designed to block unauthorised changes to ...
There are opportunities for big data in cyber security, according to technology specialist at BSkyB Jamie Randall. Speaking at Computing's Big Data Summit 2013 today, Randall said that big data could be used to interpret alerts and ...
Tags: Computer Products, software
Andrew Auernheimer, a hacker who was convicted last November of illegally accessing emails and other data belonging to 120,000 iPad 3G owners from AT&T's networks is seeking leniency in his sentencing from the court. In a memo filed ...
The password encryption algorithm used in some recent versions of the Cisco IOS operating system is weaker than the algorithm it was designed to replace, Cisco revealed earlier this week. The new encryption algorithm is called Type 4 and ...
Google has paid out $7m (£4.6m) across 38 US states in a legal settlement over the "inappropriate" harvesting of personal data that occurred during its Street View project between 2008 and 2010. Data included emails, passwords and ...
Tags: Google, emails, internet browsing
A cyber-security company was the big winner at a new awards event. The awards were part of a three day event called Innovate UK 2013, which is a joint venture by the Technology Strategy Board (TSB) and UK Trade & Investment (UKTI) aimed ...
Tags: Cyber security, Technology, PixelPin
Burger King saw a surprising upside after its Twitter stream was recently compromised: Tens of thousands of people began following its account. The company had about 50,000 followers before the hack, but that number shot up to more than ...
Tags: Twitter, Burger King