Global Technology MapShu Shu Shu information science innovation frontier2016 is about to end, for most people, this is a busy and valuable year, but for some companies, 2016 is not good. Today, take a look at the foreign media Marshable ...
Tags: Marshable summary, hot spot
Sony is taking dramatic measures in its response to a devastating hacker attack on its movie studio. Sony Pictures Entertainment has had a large proportion of its dirty laundry aired on the internet, with thousands of private emails ...
Tags: Sony, Consumer Electronics
Going on the most recent security flaw in Java, Oracle should rewrite the programming language completely and start again from scratch, according to Bogdan Botezatu, Senior E-Threat Analyst with Bitdefender, a Romanian-based antivirus ...
Tags: Java, security flaw, Oracle, programming language
Android Forums, an online forum for Android users, was the target of a hacker attack that could have led to user information including passwords getting compromised, its operator Phandroid.com said on Thursday. Members of Android Forums ...
Tags: Android Forums, Android users, online forum, hacker attack
Dozens of US banks face a "credible" threat from hackers based in Eastern Europe who are planning large-scale attacks next year, a security firm said in a report. The report released by McAfee Labs supports the conclusions of ...
Tags: US banks, hacker, hacker attack, internet security
Windows 7's malware infection rate climbed by as much as 182% this year, Microsoft said today. But even with that dramatic increase, Windows 7 remained two to three times less likely to fall to hacker attack than the aged Windows XP. ...
Tags: Windows 7, Malware Infection, US, Microsoft
Many global organisations could do a lot more to protect their private data and reduce exposure to attacks by hackers,according to KPMG. More than three quarters of organisations in the Forbes 2000 are leaking data,potentially creating ...
Tags: KPMG, Online Risk, hacker attack, security threat
Ancient military wisdom dictates that defenders need to know themselves as well as their enemy, and this can be applied to defending information security today, says security firm Websense. In building effective IT defences, businesses ...
Tags: information security, Websense, IT defences, Hacker Attack