McAfee said it has found a vulnerability in Adobe Systems' Reader program that reveals when and where a PDF document is opened. The issue is not a serious problem and does not allow for remote code execution,?wrote?McAfee's?Haifei Li in a ...
Tags: McAfee Spots, PDF-Tracking Flaw
Intel has purchased Mashery, a provider or API management tools, in the chip maker's latest move to expand into software and services. The Mashery API management service will become a core element of a suite of cross-platform services ...
Tags: Computer Products, software
The White House wants more protection for the privacy of citizens in the latest redraft of the controversial Cyber Information Sharing and Protection Act (CISPA). CISPA, which has been pushed forward by the House Permanent Select ...
Tags: Computer Products, CISPA
Indian outsourcing and services company Infosys has teamed up with Queen's University Belfast to conduct joint research into the global cyber security threat. The partnership brings together Queen's University Belfast's Centre for Secure ...
Tags: Computer Products, Computer
West Hertfordshire Hospitals NHS Trust is seeking an external supplier for its ICT infrastructure improvement programme. The value of the contract is expected to be between £30m and £50m. The supplier chosen will be required ...
Today's launch of St Helens and Knowsley Informatics Service's medical record digitisation service should prove a welcome development for an NHS suffering space, staff and security problems in its ongoing battle with paper medical record ...
Tags: technology, Data Digitisation
Doncaster and Bassetlaw Hospitals NHS Foundation Trust has selected security software provider Wave Systems' Safend Data Protection Suite, to help it to comply with the Data Protection Act (DPA) 1998, the Information Governance Toolkit and ...
Tags: software provider, NHS Trust
Security vendor Sophos has released an update for the software used on its Web gateway security appliance in order to address three serious vulnerabilities in the product's Web-based user interface. The vulnerabilities could allow ...
Tags: Web Security Appliance, Security, Computer Products, web, Security vendor
A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, according to security researchers from antivirus vendor McAfee. Dubbed vSkimmer, the ...
Tags: vSkimmer, malware, Internet market
A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, according to security researchers from antivirus vendor McAfee. Dubbed vSkimmer, the ...
Tags: Vskimmer Malware, Point-of-Sale Systems, Computer Products
A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, according to security researchers from antivirus vendor McAfee. Dubbed vSkimmer, the ...
Tags: Vskimmer Malware, Point-of-Sale Systems, Computer Products
The Home Office has announced a plan to bring together the skills of the police, industry experts and academics in a Cyber Crime Reduction Partnership (CCRP) to help to stamp out cyber-crime. Security minister James Brokenshire announced ...
nCrypted Cloud, a cloud data privacy company that brings world-class privacy to data stored on cloud storage providers such as Dropbox, GoogleDrive and SkyDrive, has announced the launch of its free nCrypted Cloud service. Nick Stamos, ...
Tags: Free Service, Image Data, cloud storage
Tripwire is to buy nCircle in a deal which could create one of the largest security and vulnerability management companies in the sector. Tripwire is to buy nCircle in a deal which could create one of the largest security and ...
Tags: Tripwire, nCircle, vulnerability management
China's foreign minster on Saturday called on nations to cooperate on Internet security, rather than wage cyberwarfare, as he denied accusations in a recent report that the country's military was behind hacking attacks. "Cyberspace needs ...
Tags: Internet security, cyberwarfare, China