The U.S. government, finally realizing that it has to take action to ensure a minimum level of cybersecurity in networks that manage the nation's energy, water and financial services, presented the Framework for Improving Critical ...
Tags: Consumer Electronics
The sophistication of information gleaned from "big data" has reached such a level that it is starting to impinge on privacy, warns Menno van Doorn, a director at VINT Research, which is part of the Sogeti IT services company. Van Doorn ...
Tags: Computer Products, software
South Lanarkshire Council is on the lookout for security software providers in a tender worth nearly £1m. The Scottish council is looking for a partner to deliver a range of IT security-related services and software over a four-year ...
Tags: Computer Products, software
Fresh from yesterday's revelations about BlackBerry security holes discovered by GCHQ at 2009's G20 meetings, BlackBerry is fighting similar claims against its newest BlackBerry 10 platform. BlackBerry posted an advisory on its Knowledge ...
Tags: Blackberry, Z10
Wall Street plans to hold a simulated cyber-attack against equity markets this month that experts hope will set an example of how industries should test their defences against assailants. Called Quantum Dawn 2, the drill will involve big ...
Tags: Wall Street, Security Defences
The inability of businesses to properly store and analyse big data leaves them vulnerable to security breaches. That is according to research by security provider McAfee, which finds just 35 per cent of organisations can quickly detect ...
Tags: Improper Big Data Storage, McAfee
Teaching engineers cyber security skills is vital in order to protect the UK's critical national infrastructure, according to cyber expert at the Institute of Engineering and Technology (IET), Hugh Boyes. The IET is trying to raise ...
Tags: Computer Products, software
Ivo Opstelten, Dutch minister of Safety and Justice The Dutch government on Thursday presented a draft bill that aims to give law enforcement the power to hack into computer systems — including those located in foreign countries ...
Tags: Dutch Bill, Computer Products
The U.S. Federal Trade Commission has reached a settlement with HTC America over security holes in the company's smartphone and tablet software that left millions of users' personal information at risk. Under the terms of the agreement, ...
Tags: HTC America, smartphone, tablet, software
Software engineers working for the US military will have to follow new testing procedures to reduce the risk of security flaws in their code. That is one of a number of computer security-related measures contained in the 2013 National ...
Tags: Software, US Military, Legal Checks
IDG News Service - Google has taken steps to close potential security holes created by a fraudulent certificate for its google.com domain, discovered in late December. The certificate was erroneously issued by an intermediate certificate ...
Tags: Google, software, browser, HTTPS servers
A group of hackers on Thursday published a list of over 453,000 log-in credentials on the Internet that were allegedly stolen from a database associated with an unnamed Yahoo service. The group of hackers calls itself "the D33Ds Company" ...
Tags: hackers, Yahoo, database, leaked information, MySQL
IDG News Service - Google on Tuesday released a Chrome upgrade that improves how the browser renders 3D applications, including mouse-controlled games. The improvement comes via the inclusion of the Pointer Lock JavaScript API, commonly ...
Tags: Google, Chrome upgrade, 3D applications, mouse controlled games
Microsoft has fixed 26 security holes in its software products – including five deemed "critical" – it said in its monthly security bulletin. The critical vulnerabilities affected Microsoft's Windows operating system, Internet ...
Tags: Microsoft, security holes, software products, critical vulnerabilities
Google has upgraded its Chrome browser for Android devices, boosting its security framework and patching several security bugs. The security holes that were fixed were all rated as “medium” for their severity, and Google paid ...
Tags: Android, application, Chrome, Google, malicious, security