A trio known for their prowess in hacking Apple's iPhone software indicated on Thursday they may be edging closer to breaking the improved security measures in iOS 6. The hackers, who spoke at the Hack in the Box security conference in ...
With only a week left to go until Christmas, the iPad mini has been crowned the most looked-for festive gift of 2012. That is according to online shopping website PriceGrabber.co.uk, which based its findings on website analytics for 1 ...
Tags: Ipad Mini, Christmas Gift, Ipad, Consumer Electronics
The hand of government is not all that heavy on businesses when it comes to notification requirements about data breaches that affect personal information. And it looks like it won't get much heavier, even if a bill sponsored by U.S. Sen. ...
Tags: data breaches, personal information, law, wiggle room
Millions of subscribers to Virgin Mobile's services in the United States are wide open to account hijacking because of the insecure manner in which the company authenticates users to their online accounts, an independent software developer ...
Tags: subscribers, Virgin Mobile's services, account hijacking, online accounts
Google's decision last week to put its Google Wallet e-wallet system into the cloud is not sitting comfortably with security experts. Though the service's move from physical handsets to the cloud has expanded its credit card compatibility ...
Tags: Google, Google Wallet, cloud, security experts
HP and Emirates Airlines today announced a collaboration in which Emirates staff will begin using the HP ElitePad 900 tablet as the primary interface for the airline’s new Knowledge-driven Inflight Service (KIS), making the airline ...
Tags: Cabin Crew, Dubai, ElitePad, Emirates Airline, HP
A federal judge has rejected BancorpSouth's plan to use contractual agreements with customers as a shield against liability claims stemming from an online heist of some $440,000 that was illegally wire-transferred from the account of one of ...
Tags: federal judge, BancorpSouth, online heist
The technique of using deception and manipulation to gain sufficient knowledge to dupe an unwary individual, employee or company into revealing personal information has the potential to be one of the biggest security threats in 2013 ...
Tags: big data, cloud, Gartner, social engineering, Windows
Up to 10 percent of mobile apps expose user passwords and login names, 25 percent expose personally identifiable information and 40 percent communicate with third parties, according to research results released today by ThreatLabZ, a ...
Tags: highlightedpost, mobile apps, mobile security, mobility, research, Securtiy
Skype has been battling wily adversaries who are abusing the Internet calling application to direct people to scam websites, but the Microsoft-owned service says the sham calls are decreasing. The automated calls feature a ...
Tags: highlightedpost, internet, Microsoft, scam, Skype
The UK should declare cyber war on states and criminals who target the country by using aggressive retaliatory strikes, says Parliament's Intelligence Security Committee (ISC). The call comes in the ISC's annual report, which says too ...
Tags: UK, cyber war, criminals, aggressive retaliatory strikes, ISC
Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cyber criminals with an opportunity to launch attacks in a botnet-like fashion, according to a report from security consultancy ...
Tags: cloud provider, network, security consultancy, BAE System
Advanced persistent threats (APTs) are real and all companies should be taking them seriously, says telecommunications company AT&T. In the past year, the company has set up an IT security team dedicated to researching APTs and making ...
No two businesses are alike,and when you're starting a new venture from scratch,we realise this at BT Business Direct. September 26,2012/24-7PressRelease/--That's why we're in partnership with Dell,the leading light in providing ...
Tags: BT Business Direct, Dell, business solutions
European Network and Information Security Agency (ENISA) has advocated to impose mandatory cyber insurance for firms and urged insurance firms to develop related schemes, which will assist them to save reputational damage. The agency in ...
Tags: ENISA, mandatory insurance, CSO