“Collecting more and more unstructured data will open up another whole degree of attractiveness and may well lead to attackers seeing value in a form not previously recognised by the organisation that owns the data.” So ...
Websites are increasingly tracking users without their knowledge or permission by using "device fingerprinting" to identify individual web users. Device fingerprinting uses the data sent by a PC, smartphone or tablet computer to websites ...
Tags: Fingerprinting, Computer Products, software
LinkedIn's domain name was temporarily redirected to a third-party server Thursday, which resulted in a service outage and potentially put user accounts at risk of compromise. Uptime monitoring service Pingdom recorded that LinkedIn was ...
The Inspector-General of Police, Mohammed Abubakar has warned motorists to desist from indiscriminate use of vehicles with tinted glasses. He said laws banning such vehicles were still in force and that the police would soon clampdown on ...
Tags: tinted glasses, glass, Tinted Glass Vehicles
HP on Monday unveiled its Big Data Security strategy, describing how combining the enterprise search and knowledge management resources from its Autonomy subsidiary with its ArcSight security-event and information management (SIEM) can ...
Tags: HP, Big Data Security Strategy, SIEM
IT often virtualises new applications and workloads by default.Virtualisation is now the norm,deploying a physical server the exception.Yet,a third of companies admit they have not invested in security for their virtual computing ...
The UK national Cyber Security Challenge has announced the winner of its Can you talk security? competition devised by BT and Get Safe Online. Winner Leo Pickford, an IT manager at a design company, could soon see his ...
Tags: UK national Cyber Security Challenge, BT, Get Safe Online, net security
A new tool allows Mac OS X attackers with root OS access to easily steal the keychain password data of logged in users and reinforces the dangers of granting administrative privileges to applications without serious consideration. The ...
Tags: Apple, hackers, Keychain data, Mac OS X
The planned introduction of more than 1,900 new generic top-level domain (gTLD) names by Internet Corporation for Assigned Names and Numbers (Icann) could have security implications, researchers have warned. The plan to allow web ...
Tags: gTLD, Icann, security implications
Security experts are warning businesses to take the publication of encrypted LinkedIn passwords by a hacker seriously. The professional networking site has confirmed that "some" of the stolen passwords posted online by a hacker correspond ...
Tags: security experts, businesses, LinkedIn passwords, hacker
Nearly a quarter of worldwide internet users are still running outdated browsers, creating huge gaps in online security, a study has revealed. Out of a random sample of 10 million customers, security firm Kaspersky found 23% were using ...
Tags: browsers, outdated browsers, online security, Kaspersky, security threats
Switzerland's largest retailer is working with IBM to use business analytics to turn its refrigerated warehouses into part of a future smart electricity grid in the country. Migros, the Swiss supermarket, is part of a project involving ...
Tags: Switzerland, IBM, business analytics, smart electricity
Small and medium enterprises (SMEs) are struggling to keep IT infrastructure up to date with mobile working and the increasing volume and sophistication of cyber threats, a survey has revealed. Most SMEs (92%) now need to support remote ...
Tags: SMEs, IT infrastructure, mobile working, cyber threats