Security

Data Loss Companies Risk £500,000 Fine As Fraud Soars

British companies are facing fines of up to half a million pounds for data losses, as experts warn that fraud…

15 years ago

Facebook And Google: Who’s The Good Guy?

Google gets praise for standing up to China, while Facebook's Mark Zuckerberg has unleashed a storm of protest over privacy.…

15 years ago

IBM Plans To Share Patent Plans With Customers

IBM, which once again was the top patent producer in the industry in 2009, is now ready to share its…

15 years ago

Google Considering Exit From China Following Gmail Hack

Google says it is no longer willing to censor search results in China, and is considering closing its offices due…

15 years ago

Absolute Teams Up With Intel To ‘Brick’ Stolen Laptops

Absolute Software has added Intel technology to its anti-theft software, which can at the touch of a button turn a…

15 years ago

Security Researchers Crack 768-bit RSA Encryption

A group of academic security researchers have cracked the 768-bit RSA encryption, used for protecting sensitive data in transit

15 years ago

Spammers Flocking To Free Web Hosting Sites

Security vendor McAfee has warned in a new report that spammers are increasingly turning to free-hosting websites to provide spam…

15 years ago

Twitter Hiring Push Focuses On Security And Products

In a sign of Twitter's increasing commercial focus, the micro-blogging site has announced it is to hire 27 new employees…

15 years ago

Facebook’s Zuckerberg Questions Privacy Expectations

Privacy is no longer a social norm, according to the founder of Facebook, Mark Zuckerberg commenting on the rise of…

15 years ago

Visa Receives £37m Over Data Breach Incident

Heartland Payment Systems agrees to pay as much as $60 million (£37m) to Visa to address losses by credit and…

15 years ago

Microsoft Issues First Security Patch Of 2010

Microsoft is planning to plug a Windows security hole rated critical for Windows 2000 systems, in the company's first Patch…

15 years ago

Cisco Acquires Security Start-up Rohati Systems

Cisco says it has bought Rohati Systems, a company specialising in agentless transaction networking systems

15 years ago

Iomega Offers Virtual PC Clones

Storage provider Iomega is now offering technology that will allow users to keep a virtual copy of their computer in…

15 years ago

Social Networking Suicide Can Be Painful

Security expert condones Facebook's decison to block Web 2.0 Suicide Machine, which deletes profiles from the social networking site

15 years ago

Review: IBM’s Proventia Management SiteProtector

IBM's Rational AppScan and ISS Proventia IPS GX5108 combine proactive application vulnerability scanning with live IPS attack reports to provide…

15 years ago

U2’s Bono Stage Dives Into File-Sharing Debate

The Irish rocker has cited China's clampdown on online free speech as evidence that ISPs could do more to tackle…

15 years ago

EMC Acquires Risk Specialist Archer Technologies

EMC has acquired governance, risk and compliance software maker Archer Technologies

15 years ago

Kingston Admits To Secure USB Drive Flaw

There are red faces over at Kingston after the company admitted that a number of its encrypted USB sticks can…

15 years ago

Symantec Reveals SaaS Plans For 2010

The security company has discussed its plans for the SaaS space in the coming year

15 years ago

Security Holes Discovered In Google Calendar and Twitter

A security researcher uncovered some holes in Google Calendar and Twitter that may allow an attacker to steal cookies and…

15 years ago

TJX Hacker Admits To More Hacking Charges

TJX hacking mastermind Albert Gonzalez is facing a longer stretch in prison after pleading guilty to yet more hacking charges

15 years ago

Microsoft Downplays Concerns Of IIS Zero-Day Bug

Microsoft is attempting to downplay concerns over a security vulnerability in IIS, and insists it would need an insecure configuration…

15 years ago

Security Worries Over Smuggled Mobiles In Prison

The number of illegal mobile phones and SIM cards in prison has trebled in just two years leading to concerns…

15 years ago

Mobile Industry Downplays Cracking Of GSM Code

The mobile industry has downplayed worries that GSM phone users are now vulnerable to having their telephone calls intercepted

15 years ago

Obama Finally Appoints US Cyber-Security Chief

U.S. President Barack Obama has chosen Howard Schmidt to step into the role of cyber-security coordinator

15 years ago

Scareware On The Rise Over 2009 Says FBI

From serving malicious ads to poisoning search engine results for recently deceased actress Brittany Murphy, rogue antivirus operations have been…

15 years ago

Cisco Helps Cops Capture Crooks With Video Cloud

The networking giant's technology is being used to underpin an online evidence repository developed by stun-gun maker Taser International

15 years ago

Illegal File-Sharing Rife In UK, Claims BPI

Illegal file-sharing is as widespread as ever, despite plans for new government legislation to cut off pirates, but Rage Against…

15 years ago

Details Emerge Of Latest Twitter Attack

The attack that took down Twitter on 17 Dec. used legitimate credentials to log in and redirect Twitter.com to a…

15 years ago

UK Government e-Borders Scheme In Disarray

The government's decision to gather personal data on every traveller into and out of the UK is under threat from…

15 years ago