The following is a joint statement by the Department of State, the Department of Labor, and the Office of the United States Trade Representative: Today, the United States is outlining next steps in a longstanding effort to address in a ...
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the ...
Tags: Computer Products, software
Two people will share a $50,000 prize from the U.S. Federal Trade Commission for the best idea to block illegal robocalls from reaching the owners of mobile and wired phones. Serdar Danis and Aaron Foss will each receive $25,000 for their ...
Tags: Computer Products, software
Researchers from security vendor FireEye have uncovered a new advanced persistent threat (APT) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the ...
Tags: Computer Products, software
iOS continues to lead in the enterprise space as the mobile platform of choice, according to cloud computing vendor, Citrix. In its latest Citrix Enterprise Mobility Cloud report, it claimed that iOS made up 58 percent of all global ...
Tags: iOS, mobile platform, cloud computing
IDG News Service - Turktrust, the Turkish certificate authority (CA) responsible for issuing an intermediate CA certificate that was later used to generate an unauthorized certificate for google.com, claims that the bad Google certificate ...
Tags: Google certificate, Google, Microsoft, Internet
Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration ...
Tags: Security researcher, botnet, Tor network, DDoS
The upper house of the Russian Parliament passed a bill on Wednesday that the nation's IT industry believes has high potential to lead to Internet censorship. The bill, including amendments to several laws, was adopted by the upper house ...
Tags: upper house, Russian Parliament, bill, IT industry
Sourcefire announced today it has strengthened and expanded its FirePOWER appliance family, providing users with the unmatched ability to protect against sophisticated malware, advanced persistent threats (APTs) and targeted attacks. One ...
Tags: advanced malware protection, advanced persisted threats, APT, firepower
IDG News Service-Security researcher Tavis Ormandy discovered critical vulnerabilities in the antivirus product developed by U.K.-based security firm Sophos and advised organizations to avoid using the product on critical systems unless the ...
Tags: critical vulnerabilities, Sophos, Antivirus Product, critical systems
Russia has introduced a law ostensibly aimed at sites containing images of child sexual abuse and other illegal material, but it has raised fears of censorship. In July, both houses of Russia's parliament voted in favour of the law that ...
Tags: Russian, Internet Blacklist, parliament
Security company McAfee has announced four enhancements of endpoint security as part of its Security Connected strategy at McAfee Focus 2012 in Las Vegas. While first-generation security focused on finding and fixing known threats, ...
Tags: McAfee, enhancements of endpoint, Security Connected strategy, Las Vegas
The labelling of two IT suppliers as high-risk by government is part of a tightening-up of outsourcing,but how far can the government practically address the problem of failing outsourcing contracts? Fujitsu is among the companies ...
Tags: Fujitsu, outsourcing, IT services, blacklisting
Mobile device management (MDM) is not about security, according to Eric Green, senior vice-president of business development at security firm Mobile Active Defense Partners. "There is no security in MDM; its ability to secure a device is ...
Tags: MDM, BYOD, ISC, Eric Green, mobile security