With so many cyber attacks in the news recently, executives are becoming increasingly concerned about their organisation’s exposure to hackers. And so they should. According to our research, more than three-quarters of the Forbes ...
Tags: cyber attacks, hacker, Internet, network
IT security budgets are not being used to provide defence technology in some of the areas the enterprise is most likely to need it in, a study has revealed. About 33% of hacker forum discussions are about training and tutorials for data ...
Tags: IT, Hacker, Computer Products, IT Security
The head of the US National Security Agency (NSA) and Cyber Command, created to defend against internet-based attacks, has called on hackers to help make the web more secure. General Keith Alexander emphasised the common ground between US ...
Tags: hackers, National Security Agency, US, internet-based attacks
On the same day Microsoft loudly proclaims Windows 8 in New York, the aging-but-still-going Windows XP today quietly celebrated its 11th birthday. On Oct. 25, 2001, Microsoft launched Windows XP, unknowingly unleashing its most successful ...
Tags: Microsoft, Windows 8, Windows XP, 11th birthday
Google has introduced stricter rules for applications on its Android mobile operating system to reduce the number of malicious apps in the Google Play app market and improve its reputation. The revised Google Android developer policy ...
Tags: Google, Android Policy, Malicious Apps, Google Play app
Viruses targeting virtual machines (VM) are growing in numbers and will soon be the dominant force in the world of cyber crime. Speaking at this week’s SNW Europe conference in Frankfurt, Joe Llewelyn, head of global sales training ...
Tags: Viruses, Vm Aware, Computer Products
The FBI says there is "no evidence" that hacker group Anonymous gained access to 12 million identity codes for Apple devices by hacking an FBI agent's laptop. The group posted a file online that it claimed contained a sample of around one ...
Tags: FBI, Apple, Computer Products
More than one in four Wi-Fi networks in London are poorly secured or not secured at all, a scanning experiment by security firm Sophos has revealed. The experiment was conducted over two days by the firm’s director of technology ...
Tags: WiFi networks, Sophos, technology strategy, wireless network
An average of 96% of the top 100 paid mobile apps have been hacked, a study has revealed. Android is the most susceptible platform, according to the State of Security in the App Economy report by security firm Arxan Technologies. The ...
Tags: mobile apps, iOS apps, Google Android platform, Hackers
Groups of companies in the same industry could mitigate the effects of cyberattacks by pooling infrastructure resources and working together on security issues, a senior official in the U.S. Department of Homeland Security has suggested. ...
Tags: DHS Official, IT Resources, Hacks, cyberattacks
The Information Commissioner's Office is to investigate claims that Tesco's website does not offer sufficient privacy protections to customers. The UK privacy watchdog's probe comes after security experts raised a number of privacy ...
Tags: watchdog, Tesco Website, privacy protections, security problems
Securing Good Technology's mobile device management (MDM) offerings while exploring future tech developments is CTO Nicko van Someren's top priorities. Speaking to CIO Australia during the recent Gartner Symposium/ITxpo on the Gold Coast, ...
Tags: Good Technology, MDM, CTO, Nicko van Someren
Current business security models fail to prepare for cyber threats in the face of highly sophisticated, powerful cyber attack tools that are no longer the preserve of nation states, as they filter down to a wider community of attackers. ...
Tags: security models, hackers, cyber attacks, Cyber criminals
Hacktivist group Anonymous claims it brought down government websites in protest at the UK’s handling of the asylum case of WikiLeaks founder Julian Assange. The group targeted the websites of No. 10, the Home Office, the Ministry ...
Tags: Anonymous, Computer Products, Government Websites, Julian Assange
Intel researchers envision a future of driverless smart cars that can be updated at any time with the latest technology and apps. Intel hopes to play a major role in the new age, creating small, energy-efficient multi-core chips that can ...
Tags: Intel, driverless smart cars, technology, apps