Google has fully implemented a security feature that ensures a person looking up a website isn't inadvertently directed to a fake one. The Internet company has run its own free public Domain Name System (DNS) lookup service, called Public ...
Tags: Google, Computer Products
Some thousand-plus Google users have been subject to FBI security information requests since 2009, the company said Tuesday. The data build on Google's already existing tally of government data requests. The new figures look at the number ...
The London Olympics faced six major cyber attacks during the Games out of some 165 million individual security-related "events" identified by the IT team put together by Gary Pennell, the CIO of the London 2012 Olympics. Cloud was a ...
Rights advocacy groups and security practitioners remain on opposite ends of the spectrum on the merits of sharing information as a means to improve cyber security. The Electronic Frontier Foundation, the Center for Democracy and ...
Tags: rights advocacy, sharing information, Electronic Frontier Foundation
Last week the content-creating industry launched a new effort aimed at preventing copyright infringement: the Copyright Alert System—CAS, also called "six strikes." It's a warning system intended to curb illegal downloads of music, ...
In a move to counter recent reports claiming that a special unit in the Chinese Army is behind repeated cyber attacks on U.S. institutions, the nation Thursday claimed its military and defence ministries websites are routinely hacked from ...
Every day new applications appear on the world's mobile communications networks and user behaviour keeps adapting to new ways of streaming video, sharing files and communicating. New business demands, such as traffic monetisation, must ...
Tags: mobile communications networks, streaming video, sharing files
HP on Monday unveiled its Big Data Security strategy, describing how combining the enterprise search and knowledge management resources from its Autonomy subsidiary with its ArcSight security-event and information management (SIEM) can ...
Tags: HP, Big Data Security Strategy, SIEM
Silent Circle, a startup company that provides encrypted mobile communication services, released a new version of its Silent Text app for iOS that allows users to exchange encrypted files at the push of a button. The files can be set to ...
Tags: Silent Circle, mobile communication service, mobile app
China is by far the most aggressive, but not the only, country attempting the sort of extensive cyberespionage described in security firm Mandiant's dramatic report, released this week. Several other countries, most notably Russia, are ...
Tags: cyberespionage, information technology, communications sectors
China's Ministry of National Defense on Wednesday refuted the accusations that the nation's military supports cyberespionage, and said a recent security report backing the claims used scientifically flawed evidence. The ministry made the ...
Tags: cyberespionage, cyberattacks, cyber
China’s Ministry of National Defence on Wednesday denied recent accusations that the nation’s military supports cyber espionage, saying that a security report backing the claims used scientifically flawed evidence. The ...
Tags: China, accusations, cyber espionage
China has strenuously denied claims it has stolen data from US companies in a series of planned cyber attacks, and counter-claimed that it has suffered attacks originating in the US. Earlier this week, Madiant Corp, a US-based security ...
Tags: cyber attacks, Google, computers
Amazon Web Services has introduced OpsWorks, a cloud-based platform powered by the Chef framework, which will give enterprises more integrated tools for managing the complete application life cycle. Enterprises have started asking for ...
Tags: Amazon, Web Services, OpsWorks
Privacy and digital rights groups are overstating the privacy concerns in a controversial cyberthreat information bill introduced this week in the U.S. Congress, the bill's sponsors and leaders of some business groups said. Groups opposed ...