Microsoft has announced that it will introduce message encryption for its cloud-based Office 365 service in early 2014. Dubbed Office 365 Message Encryption, the system will automatically encrypt email to anyone outside a company ...
Tags: Computer Products, software, Office 365, Microsoft
Three prominent U.S. senators have in a federal court filing questioned the claim of the National Security Agency that its bulk collection of phone records is required for intelligence purposes. The brief argues that after extensive ...
Tags: US Senators, NSA, Dragnet Surveillance
Spear phishing is one of the most effective ways to break into a corporate network – and recent studies show that employees can be easily tricked on social media to provide the information needed to launch attacks. A phishing attack ...
Tags: Computer Products, software
The key to a secure bring-your-own-device (BYOD) implementation is to treat staff as security specialists, according to Intel's Rob Evered, the company's senior information security technologist and strategist. "We have got about 60,000 ...
Tags: Computer Products, software
Twitter's SMS-based, two-factor authentication feature could be abused to lock users who don't have it enabled out of their accounts if attackers gain access to their log-in credentials, according to researchers from Finnish anti-virus ...
Tags: Computer Products, software
LivingSocial, the daily deals website, has suffered a huge data breach on its computer systems, impacting up to 50 million customers. LivingSocial CEO Tim O'Shaughnessy sent employees an email, seen by AllThingsD, which explained that the ...
Tags: LivingSocial, Data Compromised
Online deals service LivingSocial was hacked at the weekend, and the personal data of more than 50 million customers may have been affected. The company said on Friday on the US that customers' names, email addresses, dates of birth and ...
Tags: Computer Products, Online deals
The passwords of about 250,000 Twitter users were stolen in a "sophisticated" cyber attack similar to those that recently hit major Western news outlets. "This attack was not the work of amateurs, and we do not believe it was an isolated ...
Tags: cyber attack, media companies, network
A quarter of a million Twitter accounts have been compromised by hackers, according to the social network. This follows similar attacks on the Wall Street Journal and the New York Times in the last two weeks. Analysis: Why Twitter may ...
Tags: Twitter, social network, cyber security
Companies using virtual servers have been warned to be vigilant, following a survey conducted by data security firm Varonis. 48% of respondents either reported or suspected unauthorised access to files on their virtualised servers. ...
Tags: virtual servers, security, Varonis
Cloud hosting company FireHost has claimed that cross-site scripting attacks increased by an estimated 160 per cent in the final quarter of 2012. The company claims that it has detected a spike in what it calls a "superfecta" of attempted ...
As one of the busiest airports in China, Nanchang Changbei International Airport manages over 3.3 million passengers and 34,000 flights per year. In 2010, Changbei Airport began an expansion project that included a new terminal and a second ...
Tags: security system, Airports, access level
Disconnecting Microsoft heritage Low cost iPhones Deploying MobileIron London Borough of Brent is planning to provide staff with up to 3,000 iPads and iPhones as it phases out Blackberry smartphones. London Borough of Brent will use ...
Tags: London Borough of Brent, iPads and iPhones, Blackberry smartphones
Cyber security at the US government's largest renewable power transmission agency has been found wanting by an Energy Department inspector general. The Western Area Power Administration (WAPA), which sells and transmits power through ...
Tags: Cyber Security, power transmission, power, information technology systems
Security experts believe passwords offer little or no protection from unauthorised access to corporate IT systems and online accounts, and now Intel is working on an alternative. An increasing number of data breaches are being blamed on ...
Tags: Intel, unauthorised access, IT systems, online accounts