Unlicensed copies of popular software Keep up to date Patch applications with security updates Conficker still a threat Malicious key generation(keygen)software is one of the fastest-growing types of a malware,according to the latest ...
Tags: top cyber threats, malicious key, malicious keygen software
Wi-Fi for Benetton staff and customers Easy Wi-Fi roll-out for Benetton Cloud-based management control cuts costs Benetton strikes a balance with Wi-Fi marketing The future for Wi-Fi at Benetton The High Street has always been a hub of ...
Adobe is aiming to make document collaboration more straightforward with the latest version of its PDF software. According to Adobe, a central feature of the version is the ability to edit documents and reuse elements of existing ...
Tags: Adobe, PDF software, PDF documents, Microsoft PowerPoint slides
UK businesses are failing to protect themselves against the risks posed by staff using personal devices in the workplace. Two thirds of UK IT managers are concerned that the use of personally owned devices in the workplace poses a ...
Tags: personal devices, IT services, Equanet, company data
Strategic planning is the only option if risk and security leaders want to succeed in a rapidly changing world,the opening session of the Gartner Security&Risk Management Summit 2012 heard in London. According to Gartner,the biggest ...
Tags: Gartner Security and Risk Summit, Strategic planning key to survival
The number of first-time users of cloud computing services in the UK has increased by 27%from last year,according to research from the Cloud Industry Forum(CIF). But the CIF survey showed that,while the rate of adoption has ...
Tags: Cloud Industry Forum, CIF, uptake rises, increased by 27 percent
Mobile device management (MDM) is not about security, according to Eric Green, senior vice-president of business development at security firm Mobile Active Defense Partners. "There is no security in MDM; its ability to secure a device is ...
Tags: MDM, BYOD, ISC, Eric Green, mobile security
There is a long history of users wanting, or needing, different tools to use in the workspace. Until recently, such desires have usually been expressed in terms of informal complaints and/or formal requests to IT to provide new equipment or ...
Tags: IT equipment, IT services, bring-your-own-device policy, personal devices
Oracle knew since April about the existence of the two unpatched Java 7 vulnerabilities that are currently being exploited in malware attacks,according to Adam Gowdiak,the founder and CEO of Polish security firm Security Explorations. ...
Computerworld - Siemens is working on a fix for a remotely exploitable vulnerability in network routers and switches from subsidiary RuggedCom that are widely deployed in refineries, power substations and other critical infrastructure ...
Tags: Siemens, network routers, ROS, router
Tesco.com,one of the biggest retail websites in the UK,is to be asked to explain the alleged poor security practices of its website to the Information Commissioner's Office(ICO). The inquiry follows investigations by security ...
Tags: ICO, retail websites, Android app, secure web page
Infoworld - When it comes to IT security, FUD (fear, uncertainty, and doubt) is more than just the tool of overhyping vendors hoping to sell their next big thing. It is the reality that seasoned IT security pros live in, thanks in large ...
Tags: IT security, FUD, Paul Ferguson, antivirus scanner
Security firm Entrust has announced that it is withdrawing from a voluntary online security standards organisation that it co-founded and co-chaired for six years. The move follows the introduction of a mandatory Intellectual Property ...
Tags: SSL, CA/Browser Forum, Security firm, the IPR policy
Denise McDonagh, director of the government's G-Cloud programme, talks to Computer Weekly about the implementation challenges of the programme and the routes being taken to break government's dependence on large outsourcers. To describe ...
Tags: Interview, G-Cloud programme, cloud frameworks, big legacy systems
Researchers have confirmed the existence of new Mac malware just hours before the release of Mountain Lion, the latest version of Apple's OS X operating system. Within hours, researchers at security company Sophos also confirmed an iOS ...
Tags: Mac, Apple, operating system, malware