Beset by some very public vulnerabilities in Java, and apparently unable to properly patch those bugs, Oracle must dramatically step up its security game, experts said Monday. "Oracle should just take a mulligan and redesign Java before ...
6Scan, a Web security startup based in Tel Aviv launched a new service on Tuesday that can scan websites for security issues, such as vulnerabilities and malware infections, and allows the website owners to automatically fix the problems. ...
Tags: Web security, 6Scan, cyber security
The pros and cons of BYOD were laid out in a panel discussion at Infosecurity 2013 yesterday, with the CISOs of Commerzbank, law firm Field Fisher Waterhouse (FFW) and National Rail all giving their views on one of the most talked about ...
Tags: BYOD, panel discussion, Infosecurity, IT industry
Technology solution provider unveils fourth annual tech trends to watch study, reveals key topics on the minds of technology professionals. When CIOs and CTOs turn to social networks, what are they tech-talking about? Logicalis, an ...
Tags: Technology solution, tech trends, CIOs, CTOs, social networks
Mario Sala,Area Manager of Italia's leading steel supplier Tuxor expressed the company's operations and the general situation of the steel markets at the SteelOrbis Spring'12 Conference and 66th IREPAS Meeting held in London. Could you ...
Tags: Mario Sala, Italia's leading steel supplier, Tuxor, steel markets
Groups of companies in the same industry could pool infrastructure resources to help each other mitigate the effects of cyberattacks and work together on security issues, a senior official in the U.S. Department of Homeland Security ...
Tags: DHS, cyberattack, security, cybersecurity
Computerworld - Google yesterday boosted payments to researchers for reporting bugs in Chrome, saying the move was prompted by a decline in vulnerabilities submitted by outsiders. "Recently, we've seen a significant drop-off in externally ...
Tags: Google, bugs in Chrome, brower, company news
Infoworld-Network and endpoint security may not strike you as the first place to scratch an experimental itch.After all,protecting the company's systems and data should call into question any action that may introduce risk.But IT security ...
Tags: crazy IT security tricks
A new survey by technical support website FixYa indicates that users of the top five cloud storage services are most concerned about capacity, security and missing files. FixYa asked users of its service about the top five issues cloud ...
Tags: issues, FixYa, cloud storage services, capacity, security, missing files
Manufacturer of the patented vehicle for deploying a mobile surveillance module joins other security industry companies to provide a solution for the on-going United States border security issues. Dallas-based TerraHawk, LLC has joined ...
Tags: TerraHawk, LLC, Security Technology Consortium, Computer Products
Attackers can read emails, contacts and other private data from the accounts of Yahoo users who visit a malicious page by abusing a feature present on Yahoo's Developer Network website, says an independent security researcher. A limited ...
Tags: Attackers, emails, private data, Yahoo users
Steven Sinofsky Computerworld - Steven Sinofsky, the former Microsoft executive ousted as the head of its Windows group five weeks ago, yesterday said he would teach at the Harvard Business School this spring. Sinofsky, 47, announced the ...
Tags: Steven Sinofsky, Microsoft executive, Windows group, Harvard
The FBI says there is "no evidence" that hacker group Anonymous gained access to 12 million identity codes for Apple devices by hacking an FBI agent's laptop. The group posted a file online that it claimed contained a sample of around one ...
Tags: FBI, Apple, Computer Products
Groups of companies in the same industry could mitigate the effects of cyberattacks by pooling infrastructure resources and working together on security issues, a senior official in the U.S. Department of Homeland Security has suggested. ...
Tags: DHS Official, IT Resources, Hacks, cyberattacks
Advanced analysis of the Morcut Mac OS X malware that targets computers running Apple’s Mac operating system (OS) or Microsoft’s Windows OS has revealed that it also targets virtual machines and Windows mobiles. The malware, ...
Tags: Morcut Malware, Virtual Machines, Symantec, Computer Products