Security firm Stonesoft has released an Advanced Evasion Technique (AET) defence system and testing tool in quick succession. Stonesoft describes AETs as a new generation of hacking techniques that enable malware, viruses, worms and other ...
Tags: Stonesoft, Advanced Evasion Technique defence system, testing tool
In a special series,Fairfax Business Media Asia will be previewing speakers from the CIO Summit 2012. The debate on cloud computing should not be about private or public clouds but on the data centre,according to Raju Chellam,cloud ...
Tags: Cloud computing, data centre, DC, migrating apps
Legacy smart electrical power grids are a prime target for cyber attack and security needs to be built into these critical systems, a study has found. The most prevalent cyber threat reported by the global energy sector is extortion, ...
Tags: cyber attack, prime target, critical systems, electrical power grids
Many global organisations could do a lot more to protect their private data and reduce exposure to attacks by hackers,according to KPMG. More than three quarters of organisations in the Forbes 2000 are leaking data,potentially creating ...
Tags: KPMG, Online Risk, hacker attack, security threat
Nvidia said it is investigating the release of encrypted passwords from its user forums, another significant data breach following recent compromises at Yahoo and LinkedIn. A group calling itself Team Apollo posted on Pastebin around 800 ...
Tags: Nvidia, Cybercrime, Hacking, USA
Security experts say the breach that led to the publication of the login details of more than 453,000 Yahoo and other companies'customers,highlights common enterprise security failings. The hacking group,known as D33Ds Company,said they ...
Tags: Security, Yahoo Voices, Hacking Group, Application
Computerworld-Yahoo today confirmed that 450,000 unencrypted usernames and passwords were stolen Wednesday from one of its services,although it downplayed the threat. "We confirm that an older file from Yahoo!Contributor ...
Tags: Yahoo Confirms, unencrypted passwords, Yahoo Contributor Network
Microsoft today patched 16 vulnerabilities, including one in Windows that's been exploited for weeks and two in Internet Explorer 9 (IE9) in the first-in-years back-to-back browser update. Of Tuesday's nine security updates, three were ...
Tags: Microsoft, USA, Windows, Internet Explorer
New email-based attacks, some of which target the aerospace industry, are distributing new variants of the Sykipot information stealing malware, according to researchers from security firm AlienVault. "We have detected a new wave of ...
Businesses need to understand the critical importance of secure software development in defending against hackers. "Businesses need to look at their reliance on software and consider the importance of secure development to their ...
Tags: software, secure software, Microsoft, Security Development Conference
Software mitigation techniques are an important element of layered security for enterprises, says Jonathan Ness, security development manager at Microsoft. Enterprises can use software mitigations to harden the operating system (OS) and ...
Tags: Microsoft, Software mitigation, operating system, Windows OS
Microsoft has released a security update for its Windows operating system to block three fraudulent certificates used by Flame,the most powerful cyber weapon discovered to date. Security researchers at Kaspersky Lab,who discovered Flame ...
After two years of negotiations, the Brazilian Chamber of Deputies has approved the country's controversial 'Forest Code'. The legislationregulates land use and allows for the creation of boundaries within which native vegetation should be ...
Tags: market view, Forest
The forest industry plays a critical role in a country's economy right from supporting the production of a diverse variety of forest based products towards generating employment and providing recreational and tourism opportunities. Given, ...
Tags: industry trends, Forest Products
Computerworld-The U.S.Department of Homeland Security(DHS)has issued an alert warning of vulnerabilities in a software technology called the Niagara AX Framework,used to manage millions of devices over the Internet. The alert,from the ...
Tags: DHS, Vulnerabilities, Niagara AX Framework, devices