Star Wars was not the only force making a come-back in 2015. The return of generic advertising brought with it a promise of increased profitability for the diamond trade. Even as numerous stories reflecting pain in the industry vied for our ...
Critical vulnerabilities in SAProuter, the SAP module used to connect users of the enterprise resource planning (ERP) software with SAP's update services, could be compromising their security, according to Alexander Polyakov, chief ...
Tags: Computer Products, software
Only four per cent of UK organisations have IT security functions that fully meet their needs, a new survey released by one of the "big four" international professional services firms, Ernst & Young, claims. Ernst & Young's 16th annual ...
Tags: Computer Products, software
Security expert and reformed hacker Kevin Mitnick has branded anti-virus software useless, claiming: "The only thing McAfee is good at is making videos." Further reading Not enough cyber warriors to fight computer hackers, says former ...
Tags: Computer Products, software, hacker
There's a shortage computer hackers willing to fight back against cyber criminals on behalf of government and businesses, a former White House security chief has warned. "As with anything, it really comes down to human capital and there ...
Tags: Computer Products, software, web security
American utility providers are under constant assaults from hackers, a new Congressional report reveals, with one electricity firm reporting 10,000 attempted cyber attacks in one month. Congressmen Edward Markey and Henry Waxman surveyed ...
Tags: Computer Products
Intellectual property theft, predominantly by Chinese computer hackers, costs the US economy $300bn (£200bn) a year and must be treated as seriously as terrorism. That's according to The Commission on the Theft of American ...
Several media outlets in the Washington DC area have had their websites hacked and used to spread malware. WTOP, the largest radio station in the region, and Federal News Radio, along with the website of technology blogger John Dvorak ...
Tags: Media Websites, Cyber Attacks
A Pentagon report has accused the Chinese government of cyber attacks against military and civilian computer systems in the US. It marks the first time US authorities have directly suggested that Beijing is behind computer hacking, with ...
Tags: Pentagon, Computer Systems
The results of the quarterly Manufacturers Alliance for Productivity and Innovation (MAPI) Survey on the Business Outlook (EO-123) indicate improvement, albeit marginal, from the previous report, and imply that the manufacturing sector is ...
Tags: MAPI Survey, Business Condition
The President, in his annual State of the Union speech to a joint session of the US Congress, said the United States is facing a “rapidly growing threat from cyber-attacks.” “We know hackers steal people's identities and ...
Tags: cyber-attacks, US, cyber security
DENVER, CO, July 28, 2012 /24-7PressRelease/ -- Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or ...
Tags: Computer hackers, computer systems, computer security, Software, iComputer
The chairman of the U.S.Senate Judiciary Committee has not reversed course on email privacy and has not proposed to give U.S.agencies access to email and other electronic communications without search warrants,despite a news report to the ...
Tags: Sen.Leahy, U.S.Senate Judiciary Committee, video service providers