Against a background of millions of pounds worth of process and packaging equipment being tied up in companies today, and recent research that suggests around 5% of these assets are lying idle at any time, it is perhaps not surprising that ...
Conventional third party controls are no longer sufficient to cover the ever-expanding attack surface presented by web and mobile applications developed by service vendors and/or commercial software providers. The current third party ...
Tags: Computer Products, software
SHOWING signs of fresh life, smartphone maker BlackBerry eked out a small profit in a transition quarter in the midst of its rollout of a make-or-break platform to challenge Apple and Android. The Waterloo, Ontario firm said profit in the ...
Tags: Blackberry, Consumer Electronics, Computer Products, software
Adobe last week announced it would add a new security feature to Flash Player in an attempt to block some of the exploits hackers are hiding inside older Microsoft Office documents. The new feature -- a pop-up warning -- will be triggered ...
Tags: Adobe, security feature, Flash Player
Today’s mobile spam and phishing attacks will increasingly delivered by mobile malware networks, despite mobile device operating systems being more secure than those of desktop or laptop computers, a report has found. Blue Coat ...
Tags: mobile spam, mobile, malware networks
Oracle must dramatically step up its security game, security experts said this week, following the release of a number of very public vulnerabilities in Java, many of which still remain unpatched. “Oracle should just take a mulligan ...
Tags: Oracle, security game, public vulnerabilities, Java
Beset by some very public vulnerabilities in Java, and apparently unable to properly patch those bugs, Oracle must dramatically step up its security game, experts said Monday. "Oracle should just take a mulligan and redesign Java before ...
COSTA MESA, CA, June 28, 2012 /24-7PressRelease/ -- TROY Group, Inc., a Worldwide leader in Secure On-Demand Printing Solutions, announces free shipping to businesses in the continental United States that purchase qualifying TROY MICR ...
Tags: TROY Group, Secure On-Demand Printing Solutions, Free Shipping
The recently launched Adobe Reader and Adobe Acrobat XI come with new security features and an improved sandbox that will make the products harder to attack and exploit, according to Adobe. The sandboxing feature known as the Protected ...
Tags: Adobe Reader, Adobe Acrobat XI, security features, sandbox
An average of 96% of the top 100 paid mobile apps have been hacked, a study has revealed. Android is the most susceptible platform, according to the State of Security in the App Economy report by security firm Arxan Technologies. The ...
Tags: mobile apps, iOS apps, Google Android platform, Hackers
There are about 2.2 million people working as information security professionals today, says Hord Tipton, executive officer for security education and credentialing organization (ISC)2 and former CIO of the U.S. Department of the Interior. ...
The UK national Cyber Security Challenge has announced four face-to-face competitions for the next round of the current challenge. Cyber Security Challenge UK runs a series of national inspirational competitions aimed at attracting ...
Tags: Cyber Security Challenge, face-to-face competitions, cybersecurity
Infoworld - When it comes to IT security, FUD (fear, uncertainty, and doubt) is more than just the tool of overhyping vendors hoping to sell their next big thing. It is the reality that seasoned IT security pros live in, thanks in large ...
Tags: IT security, FUD, Paul Ferguson, antivirus scanner
Xilinx says it's shipping Artix 7 FPGAs which are an alternatives to Virtex chips but are smaller and lower cost for portable medical,had-held radio and small base-station manufacturers. With the first Artix-7 shipments to customers,that ...
Tags: Xilinx, shipping Artix 7 FPGAs
The UK national Cyber Security Challenge has launched another competition aimed at finding software developers to defend critical national infrastructure. The move comes in response to an increasing number of cyber-attacks aimed at ...
Tags: software, national infrastructure, UK