Security

Keeping Up With The Demand For Flexible Working

The modern flexible worker is more demanding than ever, says Mark Dixon. He's just overhauled the technology in his chain…

15 years ago

Apple Updates iPhone OS 3.1 SDK, Claim Reports

Apple pushed out its iPhone OS 3.1 software and the accompanying SDK for developers early 1 July, according to reports

15 years ago

Northumbria University Gets Wyse to Sustainable IT

A major new deployment of energy efficient thin client computers complements campus green-building design features as part of an environmental…

15 years ago

Firefox 3.5 Armed with Privacy Controls

Mozilla adds new privacy features to the latest version of Firefox in response to features in Internet Explorer 8, Apple…

15 years ago

Cisco Pushes Beyond Traditional Roots To Challenge HP, IBM

Cisco chief John Chambers has pointed to new sectors it will either enter or grow in, bringing it into even…

15 years ago

Researcher Discovers Theft Of 88,000 FTP Credentials

A Trojan which stole 88,000 FTP credentials may have been in action for more than two years, say researchers

15 years ago

China Pulls “Unsafe” Green Dam Internet Filter

The Chinese Government's plan to require Green Dam Internet filtering software on all new PCs has been delayed indefinitely

15 years ago

Report Sees Big Growth Future for SaaS Security

A report from research firm Infonetics predicts software-as-a-service (SaaS) is the future of managed network security.

15 years ago

Pirate Bay Sold For £4.7 Million

The Swedish software firm buying Pirate Bay plans to use its brand together with new file-sharing technology to create a…

15 years ago

Microsoft To Open Green Cloud Dublin, Chicago Data Centres

Microsoft plans to roll out two new data centres in Dublin and Chicago in July, preparing for increased demand for…

15 years ago

Sun Ray Users Get More Options With RingCube Desktop Virtualisation

Sun Microsystems and RingCube are joining forces to offer Sun Ray users more options when deploying a desktop virtualisation environment.

15 years ago

Tory Paper Demands Government Give Back Our Data

A new Conservative think tank report is calling for citizen-centric, open source IT development to put an end to wasteful,…

15 years ago

Social Networkers Are Slack On Internet Security

A Webroot survey has found those using social networks such as MySpace and Facebook are not doing enough to protect…

15 years ago

Whitelisting: Is It Good Enough To Replace Anti-Virus?

An approved list of apps, or whitelist, is flavour of the month in security. But vendors and alanlysts question whether…

15 years ago

IBM Discovers Scheme To Manipulate Encrypted Data

A Researcher at IBM has found an encryption method that lets you operate on data without decrypting it: good news…

16 years ago

Disaster Recovery The Achilles Heel Of Virtualisation

Many companies are not able to deploy separate backup data centre locations to provide the complete data-recovery system, relying instead…

16 years ago

UK Cyber Security Agency Will Employ “Naughty Boys”

Britain's new Cyber Security Minister admits to counter-attack capability, and is accused of stealing President Obama's ideas, and eroding liberties

16 years ago

US Announces Plans For Cyber Command

Plans for the Cyber Command come a month after President Obama declared cyber-security a "national security priority" in a speech

16 years ago

Windows Security Essentials – Why Morro Might Shame Microsoft

Morro - now known as Windows Security Essentials - is a security update, and yet another admission from Microsoft that…

16 years ago

President Obama’s Take On Cyber Security

Technology executives praised the president's cyber-security strategy. But they liked Bush's recipe too: what has Obama cooked up?

16 years ago

Lost-Laptop Council Breached Data Rules

Stolen laptops had unencrypted personal data - and Manchester City Council's response may not be enough

16 years ago

UK Council Breaches Data Rules Following Laptop Theft

But the organisation says it won't ban the download of important data onto mobile devices but ensure that only "essential…

16 years ago

Security Software Up 20 Percent In 2008

According to Gartner, some of the growth was due to increased demand for appliance-based products

16 years ago

Companies Expect Job Cuts But Not In IT

Nine out ten companies say they have no plans to cut back on their IT headcount despite making redundancies in…

16 years ago

China Calls On Google To Control Explicit Content

China has begun blocking Chinese-language search engine results deemed pornographic and is calling on Google to do more to combat…

16 years ago

Microsoft Readies Free Security Software

The free product represents Microsoft's latest swing at the consumer security market, which is dominated by vendors such as Symantec…

16 years ago

Don’t Block Your Staff From The Web!

The Web is a dangerous place, but if you try to keep your employees off it, you'll only make things…

16 years ago

Researchers Uncover 40,000 Compromised Sites

Researchers at Websense uncover a mass compromise of legitimate sites in an attack called Nine-Ball that is redirecting users to…

16 years ago

China Claims Blocking Software Is Not Compulsory

While PC makers were told the software must be included with all PCs sold in China, the Chinese government is…

16 years ago

Digital Britain- It Could Be A Great Piracy Experiment

The UK government's proposed crackdown on ilegal copying could make a perfect test of the music industry's assumptions, says Peter…

16 years ago