Current business security models fail to prepare for cyber threats in the face of highly sophisticated, powerful cyber attack tools that are no longer the preserve of nation states, as they filter down to a wider community of attackers. ...
Tags: security models, hackers, cyber attacks, Cyber criminals
SQL injection (SQLi) attacks rose 69% in the second quarter of 2012 compared with the previous quarter, according to the latest report from secure cloud hosting firm FireHost. FireHost said that, between April and June, it blocked nearly ...
Tags: SQL injection, SQLi attacks, FireHost, secure cloud hosting
Huawei Technologies said on Thursday it was verifying claims that its routers contained critical vulnerabilities, after security researchers disclosed alleged problems last weekend. "We are aware of the media reports on security ...
Tags: Huawei Technologies, routers, critical vulnerabilities, security
Computerworld - If the iPhone 5 sells as well as analysts predict, its impact on IT shops wrestling with the bring-your-own-device (BYOD) trend could be dramatic. According to some analysts, enterprise use of the new iPhone, which is ...
Tags: iPhone 5, IT shops, bring-your-own-device, desktop app, smartphones
As we've seen in recent years, natural disasters can lead to long-term downtime for organizations. Because earthquakes, hurricanes, snow storms or other events can put data centers and other corporate facilities out of commission for a ...
Tags: tech trends, IT, DR, BC
Medical devices often use commercial PCs and have wireless connections that make them vulnerable to malware, or require software updates for security, but the U.S. may not be doing an adequate job tracking these risks, researchers ...
Tags: Medical-Device Security, security IT, malware, computer technology
The UK national Cyber Security Challenge has announced the winner of its Can you talk security? competition devised by BT and Get Safe Online. Winner Leo Pickford, an IT manager at a design company, could soon see his ...
Tags: UK national Cyber Security Challenge, BT, Get Safe Online, net security
Government departments have been given the go-ahead to use iPhones to send and receive sensitive emails, as part of moves to broaden the number of approved public sector mobile devices beyond BlackBerrys. Under new guidelines, civil ...
Tags: iPhone, mobile device, Apple device, BlackBerry
As the trend for using mobiles in the workplace continues to grow, a new study has found a huge volume of data is being lost by employees taking advantage of the technology. The research from Kroll Ontrack claimed one in eight employees ...
Tags: mobiles, mobile devices, technology malfunctions, critical data
Emarsys a leading provider of email, social and mobile marketing automation solutions is proud to announce that it is now ISO 27001 certified. One of the only email service providers to be granted the highest level of security ...
Tags: Emarsys, leading provider of email
A piece of malware called Mahdi or Madi has been used to spy on hundreds of targets from Iran, Israel and a few other Middle Eastern countries during the past eight months, according to researchers from security vendors Seculert and ...
Tags: malware, Mahdi, Iran, Israel, Middle Eastern countries, computers
A U.S. House intelligence committee report warning that two Chinese networking companies are posing security risks to the country also includes allegations of job bias and visa fraud at one of the firms, Huawei Technologies. The report, ...
Tags: U.S., security risks, Huawei, visa fraud
PRIVATE WiFi, an innovative company in the security software market, now offers site seals so that websites can let their users know that they are concerned with data privacy and online security. PRIVATE WiFi's site seals add a badge of ...
Tags: PRIVATE WiFi, security software market, data privacy, online security
Defence companies can effectively “put a red line through public cloud offerings” because of the security risks involved, according to a senior IT solutions manager at Swedish military equipment manufacturer Saab. Christer ...
Tags: cloud, defence, military, saab, security risk
About five years ago Genomic Health began to introduce cloud-based business applications. Ken Stineman, senior director of enterprise architecture and security, quickly became aware of the security risks these apps posed. CSO contributor ...
Tags: Genomic Health, cloud business applications, security, apps