Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses. When they found one, they enumerated the advertising services (Web server, ...
The file-sharing utility Dropbox is now offering two-factor authentication, a system that makes it much harder for hackers to capture valid credentials for a person's account. Dropbox, one of the most widely used web-based storage ...
Tags: Dropbox, Security, Authentication
Microsoft has fixed 26 vulnerabilities in its software products, including several considered critical, the company said on Tuesday in its monthly security patch report. The security holes, described in five critical and four important ...
Tags: Microsoft, vulnerabilities, software products, Windows, Office, IE
Headquartered in Atlanta, AirWatch has been in the MDM business since 2003 with one goal in mind-helping companies focus on using mobile technology rather than the complexities of managing it. When your business is ready to take mobile ...
Tags: AirWatchm, MDM business, mobile technology
Microsoft Windows 8 support for TPM Tipping point for TPM TPM gathers momentum The end of the password? TPM in action across all devices Since 2006, many new computing devices have been sold with a built-in trusted platform module ...
Tags: Microsoft Windows 8, TPM, password
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Despite the downturn, 40% of organisations plan to increase their security budgets in 2013 in ...
Tags: IT security, security budget, security spending, IT industry
Hackers have compromised two servers used by the FreeBSD Project to build third-party software packages.Anyone who has installed such packages since Sept.19 should completely reinstall their machines,the project's security team warned. ...
Tags: hackers, FreeBSD, third-party software packages, SSH Keys
Cloud storage provider Dropbox has confirmed that usernames and passwords stolen from other websites were used to sign in to a small number of Dropbox accounts. "A stolen password was also used to access an employee Dropbox account ...
Bank employees, not customers, are now the main target of financial cyber attacks, according to the FBI. In a warning issued earlier this week, it said the latest trend by cybercriminals is to get employee login credentials, using spam ...
Tags: BYOD, cyberattack, cybercrime, FBI, highlightedpost, risk, Trojan
Facebook has restricted the rate at which users can perform phone number searches on its mobile website in order to block a recently disclosed method of harvesting phone numbers. “The ability to search for a person by phone number ...
Tags: Accounts, Facebook, highlightedpost, Mark Zuckerberg, Passwords, security
Customers and end-users are having the wool pulled over their eyes by organisations that fail to report data breaches, according to Simon Bain, CTO of document management firm Simplexo. The EU information security agency Enisa recently ...
Tags: data breaches, arrogant firms, customers
Security experts are warning businesses to take the publication of encrypted LinkedIn passwords by a hacker seriously. The professional networking site has confirmed that "some" of the stolen passwords posted online by a hacker correspond ...
Tags: security experts, businesses, LinkedIn passwords, hacker
Advanced persistent threats (APTs) are real and all companies should be taking them seriously, says telecommunications company AT&T. In the past year, the company has set up an IT security team dedicated to researching APTs and making ...
Dell has jumped feet first into the Windows 8 era of computing with a redesigned portfolio of business and consumer PCs. Built to best optimise Windows 8, Dell has delivered designs that make touch computing available to more customers than ...
Bruce Chantry, Equipment Portfolio Manager, The Lincoln Electric Company In a competitive global economy, efficiency reigns supreme on the shop floor, especially when it comes to overall equipment effectiveness. With this in mind, ...
Tags: Lincoln Electric, welding product, monitoring tools, welding power source