Oracle added a feature in Java that lets companies control what specific Java applets are allowed to run on their endpoint computers, which could help them better manage Java security risks. The new feature is called the "Deployment Rule ...
Tags: Computer Products, software
IBM is to acquire security firm Trusteer, whose software aims to help protect organisations against financial fraud and advanced security threats. Financial terms were not disclosed. Further reading IBM acquires cloud computing firm CSL ...
Tags: IBM, Financial Security
Nearly 75 percent of government IT budgets are staying flat or increasing, according to a survey by analysts at Gartner. This comes in opposition to a continuing drive, especially in the UK, to lower the cost of government IT contracts by ...
Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps. The ICS ...
A variety of network-controlled home automation devices lack basic security controls, making it possible for attackers to access their sensitive functions, often from the Internet, according to researchers from security firm Trustwave. ...
Tags: Computer Products, softwre
Blumberg Grain, a US-based multi-national food security firm, has signed a letter of intent with the Nigerian federal government to invest around $250m in the country's agribusiness sector. The investment will be used for the ...
Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organisations because most of them have outdated versions of the software ...
Tags: Java, soft security, software, Computer Products
New research has shown that the vast majority of businesses are exposing sensitive corporate data to cyber-criminals by failing to implement effective BYOD strategies. The report, released this week, found that just over half of the 570 ...
Tags: Computer Products, software
The Chinese cyber-spies behind the widely publicised espionage campaign against?The New York Times?have added Dropbox and WordPress to their bag of spear-phishing tricks. The gang, known in security circles as the DNSCalc gang, has been ...
Tags: Computer Products, software
Security firm Websense has identified a new malware campaign that targets Blackberry users with a malicious attachment in fake emails. The fake emails,crafted using content copied from legitimate emails from Blackberry,state that the ...
Tags: malware, Blackberry users, Security firm Websense, ThreatScope
LOOKING for a safe password? You can give HQbgbiZVu9AWcqoSZmChwgtMYTrM7HE3ObVWGepMeOsJf4iHMyNXMT1BrySA4d7 a try. Good luck memorising it. Sixty-three random alpha-numeric characters - in this case, generated by an online password ...
Tags: Password Fatigue, Computer Products, Consumer Electronics
A recent targeted attack that used Chinese malware compromised over 1,000 computers belonging to dozens of South Korea organizations, according to researchers from Israeli security firm Seculert. The main malware tool used in the attack ...
Microsoft took a two-year-old contest and turned it on its head to come up with a new reward program that will pay security researchers up to $100,000 for demonstrating novel attack tactics against Windows 8.1. In a broad announcement ...
Tags: Microsoft, Windows 8.1, Bounty Program
Fresh from yesterday's revelations about BlackBerry security holes discovered by GCHQ at 2009's G20 meetings, BlackBerry is fighting similar claims against its newest BlackBerry 10 platform. BlackBerry posted an advisory on its Knowledge ...
Tags: Blackberry, Z10
Google's recent update of its Gmail app made archive the default setting, encouraging its users to save their email, literally, forever. This may mean a doctor's message about a medical condition, a love note, or a conversation about an ...