Arbor Networks has released its 9th Annual Worldwide Infrastructure Security Report, which has found a 36 percent increase in organisations targeted by Advanced Persistent Threats. Based on survey data provided by service provider, ...
Tags: Infrastructure Security
Amazon has released the latest software update for its Android-based tablet line. Fire OS 3.1 begins rolling out Monday to Kindle Fire HD and Fire HDX devices, bringing with it a few new features, like enterprise support and wireless ...
Tags: Amazon, New Tablet, latest software update
Vodafone has launched its Secure Device Management solution in Qatar, which it claims will help businesses better protect their company data with in-country support. It says the service will enable IT managers and administrators within an ...
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in ...
Tags: IE, zero-day, hacker, watering hole
Spear phishing is one of the most effective ways to break into a corporate network – and recent studies show that employees can be easily tricked on social media to provide the information needed to launch attacks. A phishing attack ...
Tags: Computer Products, software
“Collecting more and more unstructured data will open up another whole degree of attractiveness and may well lead to attackers seeing value in a form not previously recognised by the organisation that owns the data.” So ...
Security expert and reformed hacker Kevin Mitnick has branded anti-virus software useless, claiming: "The only thing McAfee is good at is making videos." Further reading Not enough cyber warriors to fight computer hackers, says former ...
Tags: Computer Products, software, hacker
Payments giant Visa Europe has had its communications network upgraded by telecoms giant BT, in a move that BT claims has enabled the firm to process about €2m of payments every minute. The network provides connectivity for Visa ...
Tags: Computer Products, software
Rapid 7 this week unveiled a new set of tools designed to help businesses better judge the overall effectiveness of existing security controls and the risk associated with users across the organization. The announcement came during ...
Tags: Rapid 7, software, Computer Products
Researchers showed a Black Hat audience how femotcell technology, used by phone companies to boost cell phone coverage, can be hacked to intercept cell phone calls, text messages and other data. Tom Ritter and Doug DePerry , researchers ...
Tags: Phone Calls, Exploit Cellular Tech
New research has shown that the vast majority of businesses are exposing sensitive corporate data to cyber-criminals by failing to implement effective BYOD strategies. The report, released this week, found that just over half of the 570 ...
Tags: Computer Products, software
Check Point has published its second mobile security report, revealing that 79% of businesses had a mobile security incident in the past year, in many cases incurring substantial costs. The report found mobile security incidents cost more ...
Network World - Like it or not, IT departments are accepting the fact that employees are bringing smartphones, tablets, and personal laptops to work and that they will use these devices while on the job. To cope with this reality, savvy ...
Tags: Fortune 500, BYOD
China's remarkable success at infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology expertise. State-sponsored hacking ...
Tags: Computer Products, Hackers, networks
Intruders used to creep in through ventilation ducts. Now they break in using the software that controls the ventilation. Hundreds of organizations across Australia are using out-of-date industrial control systems (ICS) to control the ...