Mobile carriers are opposed to the plan for a smartphone ‘kill switch’ that would render smartphones inoperable after they are stolen, claiming that it could be misused by hackers to block critical services. New York ...
Tags: Stolen Phones, 'Kill Switch'
Bitcoin scored several big wins this week, including endorsements from U.S. federal officials and Virgin Group founder Richard Branson, signalling its progress toward wider acceptance. Bitcoin has battled concerns about volatility, ...
Tags: Bitcoin, Bit-Part, Gaining Momentum
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in ...
Tags: IE, zero-day, hacker, watering hole
The website of a U.S. organisation specialising in national and international security policy was compromised with malware that targeted a previously unknown vulnerability in Internet Explorer. A nation-state looking to compromise the ...
Tags: Nation-state, attack, IE, flaw
A Chicago-based company that runs derivatives exchanges said Friday it was the victim of a July cyber attack that compromised customer information. CME Group, which runs four exchanges, said in a statement that information belonging to ...
It's not possible for an organisation to be aware of and secure every mobile device on the network, not matter how much the IT department tries, because staff will always connect their own smartphones and tablets to the office wireless ...
Tags: Computer Products, software, network
Spear phishing is one of the most effective ways to break into a corporate network – and recent studies show that employees can be easily tricked on social media to provide the information needed to launch attacks. A phishing attack ...
Tags: Computer Products, software
Critical vulnerabilities in SAProuter, the SAP module used to connect users of the enterprise resource planning (ERP) software with SAP's update services, could be compromising their security, according to Alexander Polyakov, chief ...
Tags: Computer Products, software
Adobe, known for its Reader and Acrobat software, has confirmed that the cyber attack it recently suffered impacted 38 million users - more than 10 times the 2.9 million customers it had said were affected initially. The attack, which the ...
Tags: Adobe, software, Computer Products
Only four per cent of UK organisations have IT security functions that fully meet their needs, a new survey released by one of the "big four" international professional services firms, Ernst & Young, claims. Ernst & Young's 16th annual ...
Tags: Computer Products, software
With the Apple launch just an hour away, Computing has been taking a look to see what might be included this time round. Last month, of course, the most intriguing aspect of Apple's iPhone 5S and 5C unveilings was the support for 64-bit ...
Tags: Apple, Computer Products, Ipads
Apple has launched a thinner and lighter iPad at its launch event in Cupertino, California. The iPad Air will be just 7.5 millimetres thick, and the weight has been reduced from 1.4lb to 1.0lb - or from 635 grams to just 455 grams, for ...
Tags: Computer Products, apple, iPad Mini
Cyber attacks on container ships and port infrastructure will get more sophisticated as time goes on and companies should be doing more to protect their supply chain security. Maritime and IT security companies have raised their concerns ...
Security expert and reformed hacker Kevin Mitnick has branded anti-virus software useless, claiming: "The only thing McAfee is good at is making videos." Further reading Not enough cyber warriors to fight computer hackers, says former ...
Tags: Computer Products, software, hacker
There's a shortage computer hackers willing to fight back against cyber criminals on behalf of government and businesses, a former White House security chief has warned. "As with anything, it really comes down to human capital and there ...
Tags: Computer Products, software, web security