A computer-scientist friend of mine opined long ago that the Internet will truly come of age only when he can download a beer. He was referring to the last-meter problem of online shopping: that of getting stuff through the door of an ...
Target said Friday that debit card PIN numbers were among the financial information stolen from millions of U.S. customers who shopped at the retailer earlier this month. The company said the stolen personal identification numbers, which ...
Tags: Target, debit card PIN numbers, stolen personal identification numbers
The cyber-extortionists behind the Cryptolocker "ransomware", which encrypts users' files and refuses to decrypt them without payment, have extended their deadline for affect PC users. Cryptolocker uses 256-bit Advanced Encryption ...
Tags: Computer Products, web surcrity
Secure email providers Lavabit and Silent Circle have formed a partnership they call the Dark Mail Alliance, with the intention of creating a secure email service that can thwart government surveillance. According to security news site ...
Tags: Computer Products, software
A malicious software tool perhaps most famously used to hack RSA's SecurID infrastructure is still being used in targeted attacks, according to security vendor FireEye. Poison Ivy is a remote access trojan (RAT) that was released eight ...
Tags: Computer Products, software
c(HDS) has released new solutions and services that it says enable enterprises to adopt cloud computing more readily, enable their mobile workforce more securely and reliably, and provide a better IT experience to their end users. The ...
Tags: Hitachi, Computer Products
Sepaton today announced major upgrades to its enterprise-class backup appliance -- almost doubling the backup speed -- added encryption for data at rest, and increased connectivity from 4Gbps to 8Gbps Fibre Channel and 10Gbps Ethernet. ...
Tags: Sepaton, high end storage appliance, HP
The Mega file-sharing service has launched a vulnerability reward program that will pay up to 10,000 euros (around $13,600) for every serious security flaw found in the platform and reported responsibly. The rules of the program were laid ...
Tags: Mega, file-sharing service, vulnerability reward program
The file-sharing service Mega has fielded 150 copyright warnings since its recent launch as founder Kim Dotcom grows a risky new business while under indictment by U.S. prosecutors for running Megaupload. And a French website appears to ...
Tags: file-sharing service, Mega, Kim Dotcom
Representatives of newly launched file-storage and sharing service Mega addressed some of the concerns raised by security researchers in recent days about the site's architecture and the implementation of its cryptographic features. In a ...
Tags: file-storage, sharing service, Mega
Silent Circle, a global private encrypted communications firm revolutionizing privacy and mobile security, today announced that its Silent Phone app delivering the industry's first peer-to-peer secure encrypted data communications service ...
Tags: Silent Circle, encrypted communications, mobile security, samrtphone app
Those popular mobile apps that everyone's buying from the official Android and Apple apps stores for business and fun are being torn apart by hackers who turn around and post these abused apps filled with malware, their content pirated or ...
Tags: mobile apps, Android, Apple, apps stores, malware
They say no one can hear you scream in space, but if you so much as whisper on the Web, you can be tracked by a dozen different organizations and recorded for posterity. Simply visiting a website can allow its operators to figure out your ...
Tags: device information, advertising cookies, web
Even as IT pros wrestle with the bring-your-own-device (BYOD) trend, corporate security is being further complicated by another emerging trend: bring your own network (BYON). BYON is a by-product of increasingly common technology that ...
Tags: IT, BYOD, corporate security, network, BYON
US space agency Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 employees and contractors. Until the encryption process is complete, staff members are forbidden ...
Tags: Nasa, mobile computer, personal information, encryption process