The U.S. Department of Justice and the Department of Homeland Security have asked for more time to consider Softbank's proposed takeover of Sprint Nextel, a move that may signal a rough road ahead for the US$20 billion deal. In a letter ...
Tags: Softbank, Sprint Nextel, Federal Communications Commission
Under the helm of new CEO Steve Bennett, Symantec late yesterday outlined a re-organization intended to lead to a leaner company and a new range of security and backup services and products, built primarily on internal research and ...
A government body in the U.K. has fined Sony $396,000 for using lax network security when its PlayStation network was hacked in 2011. The Information Commissioner's Office, a public agency to protect information rights of individuals, ...
Tags: U.K., network security, PlayStation network
Under the helm of its new CEO, Steve Bennett, Symantec last week outlined a re-organisation intended to lead to a leaner company and a new range of security and back-up services and products. These products would be built primarily on ...
Tags: CEO, Steve Bennett, Symantec
Iran's growing cyber capabilities are a "force to be reckoned with", a senior United States Air Force officer has warned. General William Shelton, commander of the US Air Force Space Command, made the comment to reporters at a Defense ...
eRacks Open Source Systems has integrated the latest 4TB Western Digital and Seagate drives into their NAS50 network attached file server. Users can now store up to 1.6 petabytes in a customized two rack system. The NAS50 will enable users ...
Tags: eRacks, drives, NAS50 network
The Shylock home banking malware has been updated with new functionality that allows it to spread automatically using the popular Skype Voice-over-IP (VoIP) and instant messaging client. Shylock, named after a character from Shakespeare's ...
Tags: banking malware, Shylock, Skype Voice-over-IP, network security
Cisco is investigating a reported vulnerability in Linksys firmware that would allow a hacker to gain full control of the wireless router. Security vendor DefenseCode discovered the flaw and reported it to Cisco "months ago." Because ...
Tags: Cisco, firmware, wireless router, network security
Says they address 'advanced' malware threats Cybersecurity software and appliance vendor Sourcefire announced it has expanded its malware protection offerings to include new Incident Response Professional Services that it says assist ...
Tags: Sourcefire, cybersecurity software, malware protection
Cyber attacks on U.S. banks over the last several months reflect a frightening new era in cyber warfare, according to security expert Darren Hayes, who says that corporations are unprepared to battle such attacks because of a shortage of ...
Tags: cyber attacks, U.S.banks, DDoS Bank
Evidence collected from a website that was recently used to flood U.S. banks with junk traffic suggests that the people behind the ongoing DDoS attack campaign against U.S. financial institutions -- thought by some to be the work of Iran -- ...
Tags: U.S.banks, junk traffic, DDoS attack campaign, U.S.financial institutions
Evidence collected from a website that was recently used to flood U.S. banks with junk traffic suggests that the people behind the ongoing DDoS attack campaign against U.S. financial institutions — thought by some to be the work of ...
Tags: bank attacks, botnets for hire, cyber attacks, Homeland Security, Iran
Infoworld-Network and endpoint security may not strike you as the first place to scratch an experimental itch.After all,protecting the company's systems and data should call into question any action that may introduce risk.But IT security ...
Tags: crazy IT security tricks
METRO MANILA, PHILIPPINES, August 29, 2012 /24-7PressRelease/ -- Imaginet International Inc, the leading systems integrator and managed network hosting and content security services provider in the Philippines, will take part in the Mining ...
An increase in hacktivism and a greater prevalence of Advanced Evasion Techniques will form part of the backdrop of IT security in 2013, according to Stonesoft With 2013 just around the corner, it is time for IT security experts to reflect ...
Tags: Stonesoft, cyber threats, Evasion Techniques, IT security