Australian telecommunications company AAPT has confirmed some business customer data was compromised in a breach of computer systems at an external service provider. The telco began investigating after hacktivist group Anonymous ...
Tags: AAPT, business customer data, computer systems, external service
German engineering firm Siemens has issued a fix for the software vulnerabilities in its programmable logic controllers (PLCs) that were exploited by Stuxnet. The computer worm was discovered in 2010 when it caused malfunctions at ...
Tags: Siemens, software, programmable logic controllers, PLCs, Stuxnet
Security firm Stonesoft has released an Advanced Evasion Technique (AET) defence system and testing tool in quick succession. Stonesoft describes AETs as a new generation of hacking techniques that enable malware, viruses, worms and other ...
Tags: Stonesoft, Advanced Evasion Technique defence system, testing tool
Government-sponsored cybercriminals are using hacking techniques to steal commercial secrets from businesses,KPMG has warned. Confidential information,including product designs and bid documents,are at risk from states seeking to win ...
Tags: Government-sponsored cybercriminals, hacking techniques
Many global organisations could do a lot more to protect their private data and reduce exposure to attacks by hackers,according to KPMG. More than three quarters of organisations in the Forbes 2000 are leaking data,potentially creating ...
Tags: KPMG, Online Risk, hacker attack, security threat
Fraudsters exchanged 12 million pieces of personal information online in the first quarter of 2012, an increase of 300% since 2010, according to credit-checking firm Experian. The company said many people were unaware their identity had ...
Tags: Online Identity Theft, credit-checking, credit cards, passwords
Security experts say the breach that led to the publication of the login details of more than 453,000 Yahoo and other companies'customers,highlights common enterprise security failings. The hacking group,known as D33Ds Company,said they ...
Tags: Security, Yahoo Voices, Hacking Group, Application
Ancient military wisdom dictates that defenders need to know themselves as well as their enemy, and this can be applied to defending information security today, says security firm Websense. In building effective IT defences, businesses ...
Tags: information security, Websense, IT defences, Hacker Attack
PC Advisor-Cloud computing is currently one of the most talked about topics for many business,for a large percentage of whom it is the perfect solution.For a startup,low costs and simple entry are appealing features--while large corporates ...
Tags: Cloud computing, mid-market, security, data privacy, Small Business
Table of contents Public Wi-Fi hotspot dangers Security of 3G and 4G-based hotspots Network access requires careful management Educating users about security risks Network security controls and practices are among the most mature,but can ...
Tags: Public Wi-Fi hotspot, 3G and 4G-based hotspots, security risks
Businesses need to understand the critical importance of secure software development in defending against hackers. "Businesses need to look at their reliance on software and consider the importance of secure development to their ...
Tags: software, secure software, Microsoft, Security Development Conference
Advanced Micro Devices (AMD) and ARM Holdings have joined forces to offer PC software developers additional security features. US-based AMD is to license technology from UK-based ARM to add an ARM-based processor to its computer chips ...
Tags: AMD, ARM Holdings, PC software developers, additional security features
Businesses are largely failing to block hackers from exploiting privileged IT accounts to access sensitive commercial data, a survey has revealed. Some 63% of more than 400 IT staff polled across Europe agreed that recent cyber attacks ...
Tags: hackers, privileged IT accounts, commercial data, cyber attacks
LinkedIn has confirmed that "some" of the stolen passwords posted online by a hacker correspond to accounts on the professional networking site. The confirmation came after reports that 6.5 million encrypted stolen passwords had been ...
Tags: LinkedIn, passwords, hacker, the professional networking site
Slovenia-LumenRadio,a technology leader in wireless lighting controls,has played a critical role in a new,energy efficient lighting project for an unusual traffic intersection in Zagorje ob Savi,in central Slovenia. The Las Vegas-style ...
Tags: Lumenradio, Slovenia, wireless lighting controls, CRMX products